Department of Computer Science and Technology

Technical reports

No Title Authors Date Notes Download
Abadi, Martín
138 Authentication: a practical study in belief and action Michael Burrows, Martín Abadi, Roger Needham 1988-06 19 p
414 A calculus for cryptographic protocols : The SPI calculus Martín Abadi, Andrew D. Gordon 1997-01 105 p PS (0.3 MB)
Abramsky, Samson
259 Full abstraction in the Lazy Lambda Calculus Samson Abramsky, C.-H. Luke Ong 104 p
Adcock, Mark
757 Improving cache performance by runtime data movement Mark Adcock 2009-07 PhD
174 p
colour
PDF (1.3 MB)
Ades, Stephen
114 An architecture for integrated services on the local area network Stephen Ades 1987-09 PhD
166 p
PDF (11.5 MB)
Adida, Ben
644 Robbing the bank with a theorem prover Paul Youn, Ben Adida, et al. 2005-08 26 p PDF (0.2 MB)
Adly, Noha
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
310 HARP: a hierarchical asynchronous replication protocol for massively replicated systems Noha Adly 1993-08 34 p PS (0.1 MB)
331 HPP: a hierarchical propagation protocol for large scale replication in wide area networks Noha Adly, Akhil Kumar 1994-03 24 p
378 Performance evaluation of HARP: a hierarchical asynchronous replication protocol for large scale system Noha Adly 1995-08 94 p PS (0.3 MB)
383 Management of replicated data in large scale systems Noha Adly 1995-11 PhD
182 p
Afshar, Mohamad
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
459 An open parallel architecture for data-intensive applications Mohamad Afshar 1999-07 PhD
225 p
PS (0.8 MB)
DVI (0.3 MB)
Afzal, Shazia
793 Affect inference in learning environments: a functional view of facial affect analysis using naturalistic data Shazia Afzal 2010-12 PhD
146 p
PDF (3.0 MB)
Agerholm, Sten
354 Formalising a model of the λ-calculus in HOL-ST Sten Agerholm 1994-11 31 p PDF (1.5 MB)
369 A comparison of HOL-ST and Isabelle/ZF Sten Agerholm 1995-07 23 p PDF (1.8 MB)
370 A package for non-primitive recursive function definitions in HOL Sten Agerholm 1995-07 36 p
Ainsworth, Sam
923 Prefetching for complex memory access patterns Sam Ainsworth 2018-07 PhD
146 p
PDF (3.5 MB)
Akoush, Sherif
888 Recomputation-based data reliability for MapReduce using lineage Sherif Akoush, Ripduman Sohan, Andy Hopper 2016-05 19 p PDF (0.5 MB)
889 Evaluating the viability of remote renewable energy in datacentre computing Sherif Akoush, Ripduman Sohan, et al. 2016-05 26 p PDF (0.6 MB)
Akritidis, Periklis
798 Practical memory safety for C Periklis Akritidis 2011-06 PhD
136 p
PDF (2.1 MB)
Allen-Williams, Mair
605 Acute: High-level programming language design for distributed computation : Design rationale and language definition Peter Sewell, James J. Leifer, et al. 2004-10 193 p PDF (1.2 MB)
Alshawi, Hiyan
25 A clustering technique for semantic network processing Hiyan Alshawi 1982-05 9 p PDF (0.6 MB)
48 A mechanism for the accumulation and application of context in text processing Hiyan Alshawi 1983-11 17 p PDF (0.8 MB)
60 Memory and context mechanisms for automatic text processing Hiyan Alshawi PhD
192 p
Amin, Nada
919 Proceedings of the 2017 Scheme and Functional Programming Workshop Nada Amin, François-René Rideau 2018-03 50 p PDF (2.8 MB)
Amjad, Hasan
601 Combining model checking and theorem proving Hasan Amjad 2004-09 PhD
131 p
PDF (0.9 MB)
602 Model checking the AMBA protocol in HOL Hasan Amjad 2004-09 27 p PDF (0.3 MB)
Andersen, Øistein E.
790 Automated assessment of ESOL free text examinations Ted Briscoe, Ben Medlock, Øistein Andersen 2010-11 31 p PDF (0.5 MB)
794 Grammatical error prediction Øistein E. Andersen 2011-01 PhD
163 p
PDF (1.6 MB)
Anderson, Henrik Reif
260 Local computation of alternating fixed-points Henrik Reif Anderson 21 p
Anderson, Jonathan
825 Privacy engineering for social networks Jonathan Anderson 2012-12 PhD
255 p
PDF (3.5 MB)
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
924 OpenDTrace Specification version 1.0 George Neville-Neil, Jonathan Anderson, et al. 2018-08 235 p PDF (0.9 MB)
Anderson, Ross J.
471 Murphy’s law, the fitness of evolving species, and the limits of software reliability Robert M. Brady, Ross J. Anderson, Robin C. Ball 1999-09 14 p PDF (0.2 MB)
500 The memorability and security of passwords – some empirical results Jianxin Yan, Alan Blackwell, et al. 2000-09 13 p PDF (0.2 MB)
549 Two remarks on public key cryptology Ross Anderson 2002-12 7 p PDF (0.2 MB)
637 The topology of covert conflict Shishir Nagaraja, Ross Anderson 2005-07 15 p PDF (0.2 MB)
640 Combining cryptography with biometrics effectively Feng Hao, Ross Anderson, John Daugman 2005-07 17 p PDF (0.2 MB)
641 Cryptographic processors – a survey Ross Anderson, Mike Bond, et al. 2005-08 19 p PDF (0.6 MB)
644 Robbing the bank with a theorem prover Paul Youn, Ben Adida, et al. 2005-08 26 p PDF (0.2 MB)
711 Thinking inside the box: system-level failures of tamper proofing Saar Drimer, Steven J. Murdoch, Ross Anderson 2008-02 37 p PDF (5.4 MB)
746 The snooping dragon: social-malware surveillance of the Tibetan movement Shishir Nagaraja, Ross Anderson 2009-03 12 p PDF (0.3 MB)
Arrighi, Pablo J.
595 Representations of quantum operations, with applications to quantum cryptography Pablo J. Arrighi 2004-07 PhD
157 p
PDF (1.0 MB)
Ashdown, Mark S. D.
538 The Escritoire: A personal projected display for interacting with documents Mark Ashdown, Peter Robinson 2002-06 12 p PDF (0.5 MB)
585 Personal projected displays Mark S. D. Ashdown 2004-03 PhD
150 p
PDF (3.4 MB)
Athar, Awais
856 Sentiment analysis of scientific citations Awais Athar 2014-06 PhD
114 p
colour
PDF (4.4 MB)
Augsdörfer, Ursula H.
689 Removing polar rendering artifacts in subdivision surfaces Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin 2007-06 7 p PDF (0.5 MB)
Bacon, Jean
117 Distributed computing with RPC: the Cambridge approach J.M. Bacon, K.G. Hamilton 1987-10 15 p PDF (1.0 MB)
166 Evolution of operating system structures Jean Bacon 1989-03 28 p
168 Distributed computing with a processor bank J.M. Bacon, I.M. Leslie, R.M. Needham 1989-04 15 p PDF (0.6 MB)
293 Objects and transactions for modelling distributed applications: concurrency control and commitment Jean Bacon, Ken Moody 1993-04 39 p
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
295 OPERA : Storage and presentation support for multimedia applications in a distributed, ATM network environment Jean Bacon, John Bates, et al. 1993-04 12 p
296 A persistent programming language for multimedia databases in the OPERA project Z. Wu, K. Moody, J. Bacon 1993-04 9 p
301 The dual-level validation concurrency control method Zhixue Wu, Ken Moody, Jean Bacon 1993-06 24 p
559 Pronto: MobileGateway with publish-subscribe paradigm over wireless network Eiko Yoneki, Jean Bacon 2003-02 22 p PDF (0.5 MB)
847 SBUS: a generic policy-enforcing middleware for open pervasive systems Jatinder Singh, Jean Bacon 2014-02 20 p PDF (1.9 MB)
863 Regional clouds: technical considerations Jatinder Singh, Jean Bacon, et al. 2014-11 18 p PDF (0.6 MB)
Bai, Zhen
874 Augmented Reality interfaces for symbolic play in early childhood Zhen Bai 2015-09 PhD
292 p
PDF (9.5 MB)
Baker, Siani L.
327 A new application for explanation-based generalisation within automated deduction Siani L. Baker 1994-02 18 p
345 A proof environment for arithmetic with the Omega rule Siani L. Baker 1994-08 17 p
Baldwin, John
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
Ballarin, Clemens
473 Computer algebra and theorem proving Clemens Ballarin 1999-10 PhD
122 p
Ball, Robin C.
471 Murphy’s law, the fitness of evolving species, and the limits of software reliability Robert M. Brady, Ross J. Anderson, Robin C. Ball 1999-09 14 p PDF (0.2 MB)
Baltrusaitis, Tadas
861 Automatic facial expression analysis Tadas Baltrusaitis 2014-10 PhD
218 p
colour
PDF (15.2 MB)
Banerjee, Arnab
786 Communication flows in power-efficient Networks-on-Chips Arnab Banerjee 2010-08 PhD
107 p
PDF (1.2 MB)
Barham, Paul Ronald
403 Devices in a multi-service operating system Paul Ronald Barham 1996-10 PhD
131 p
PS (1.6 MB)
DVI (0.1 MB)
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
Barrow-Williams, Nick
810 Proximity Coherence for chip-multiprocessors Nick Barrow-Williams 2011-11 PhD
164 p
PDF (3.8 MB)
Barthe, Loïc
539 Towards a ternary interpolating subdivision scheme for the triangular mesh N.A. Dodgson, M.A. Sabin, et al. 2002-07 12 p PDF (0.2 MB)
541 Different applications of two-dimensional potential fields for volume modeling L. Barthe, N.A. Dodgson, et al. 2002-08 26 p PDF (1.9 MB)
583 Subdivision as a sequence of sampled Cp surfaces and conditions for tuning schemes Cédric Gérot, Loïc Barthe, et al. 2004-03 68 p PDF (0.5 MB)
Basalaj, Wojciech
509 Proximity visualisation of abstract data Wojciech Basalaj 2001-01 PhD
117 p
PDF (7.7 MB)
Bates, Daniel
846 Exploiting tightly-coupled cores Daniel Bates 2014-01 PhD
162 p
PDF (1.5 MB)
Bates, John
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
295 OPERA : Storage and presentation support for multimedia applications in a distributed, ATM network environment Jean Bacon, John Bates, et al. 1993-04 12 p
341 Presentation support for distributed multimedia applications John Bates 1994-06 140 p PS (0.8 MB)
Becker, Moritz Y.
628 A formal security policy for an NHS electronic health record service Moritz Y. Becker 2005-03 81 p PDF (0.6 MB)
648 Cassandra: flexible trust management and its application to electronic health records Moritz Y. Becker 2005-10 PhD
214 p
PDF (1.4 MB)
Bella, Giampaolo
447 Are timestamps worth the effort? A formal treatment Giampaolo Bella, Lawrence C. Paulson 1998-09 12 p PDF (0.7 MB)
460 Message reception in the inductive approach Giampaolo Bella 1999-03 16 p PDF (0.9 MB)
488 Formal verification of card-holder registration in SET Giampaolo Bella, Fabio Massacci, et al. 2000-03 15 p
493 Inductive verification of cryptographic protocols Giampaolo Bella 2000-07 PhD
189 p
PDF (0.8 MB)
524 Verifying the SET purchase protocols Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson 2001-11 14 p PDF (0.2 MB)
531 Verifying the SET registration protocols Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson 2002-03 24 p PDF (0.4 MB)
Beller, Reto
219 Fairisle project working documents : Snapshot 1 Ian M. Leslie, Derek M. McAuley, et al. 1991-03 15 p
Belokosztolszki, András
586 Role-based access control policy administration András Belokosztolszki 2004-03 PhD
170 p
PDF (2.6 MB)
Bennett, Jeremy Peter
129 A methodology for automated design of computer instruction sets Jeremy Peter Bennett 1988-03 PhD
147 p
PDF (5.8 MB)
Bennett, J.P.
93 Automated design of an instruction set for BCPL J.P. Bennett 1986-06 56 p
Benton, Peter Nicholas
262 Term assignment for intuitionistic linear logic (preliminary report) Nick Benton, Gavin Bierman, Valeria de Paiva 1992-08 57 p
305 Strong normalisation for the linear term calculus P.N. Benton 1993-07 13 p
309 Strictness analysis of lazy functional programs Peter Nicholas Benton 1993-08 PhD
154 p
352 A mixed linear and non-linear logic: proofs, terms and models P.N. Benton 1994-10 65 p
365 Computational types from a logical perspective I P.N. Benton, G.M. Bierman, V.C.V. de Paiva 1995-05 19 p
388 A unified approach to strictness analysis and optimising transformations P.N. Benton 1996-02 21 p
Berenguer, Inaki
695 Efficient maximum-likelihood decoding of spherical lattice codes Karen Su, Inaki Berenguer, et al. 2007-07 29 p PDF (0.4 MB)
Beresford, Alastair R.
612 Location privacy in ubiquitous computing Alastair R. Beresford 2005-01 PhD
139 p
PDF (1.9 MB)
Beresnevichiene, Yolanta
558 A role and context based security model Yolanta Beresnevichiene 2003-01 PhD
89 p
PDF (0.5 MB)
Bergmair, Richard
663 Syntax-driven analysis of context-free languages with respect to fuzzy relational semantics Richard Bergmair 2006-03 49 p PDF (0.4 MB)
Bernhardt, Daniel
787 Emotion inference from human body motion Daniel Bernhardt 2010-10 PhD
227 p
PDF (8.7 MB)
Bertot, Yves
313 Proof by pointing Yves Bertot, Gilles Kahn, Laurent Théry 1993-10 27 p
Bierman, Gavin M.
262 Term assignment for intuitionistic linear logic (preliminary report) Nick Benton, Gavin Bierman, Valeria de Paiva 1992-08 57 p
333 What is a categorical model of intuitionistic linear logic? G.M. Bierman 1994-04 15 p
346 On intuitionistic linear logic G.M. Bierman 1994-08 PhD
191 p
365 Computational types from a logical perspective I P.N. Benton, G.M. Bierman, V.C.V. de Paiva 1995-05 19 p
401 A classical linear λ-calculus Gavin Bierman 1996-07 41 p
412 Observations on a linear PCF (preliminary report) G.M. Bierman 1997-01 30 p
448 A computational interpretation of the λμ calculus G.M. Bierman 1998-09 10 p
455 Multiple modalities G.M. Bierman 1998-12 26 p
497 Towards a formal type system for ODMG OQL G.M. Bierman, A. Trigoni 2000-09 20 p
557 Iota: A concurrent XML scripting language with applications to Home Area Networking G.M. Bierman, P. Sewell 2003-01 32 p PDF (0.3 MB)
563 MJ: An imperative core calculus for Java and Java with effects G.M. Bierman, M.J. Parkinson, A.M. Pitts 2003-04 53 p PDF (0.5 MB)
568 Dynamic rebinding for marshalling and update, with destruct-time λ Gavin Bierman, Michael Hicks, et al. 2004-02 85 p PDF (0.7 MB)
642 First-class relationships in an object-oriented language Gavin Bierman, Alisdair Wren 2005-08 53 p PDF (0.5 MB)
716 UpgradeJ: Incremental typechecking for class upgrades Gavin M. Bierman, Matthew J. Parkinson, James Noble 2008-04 35 p PDF (0.5 MB)
Billingsley, William H.
719 The Intelligent Book: technologies for intelligent and adaptive textbooks, focussing on Discrete Mathematics William H. Billingsley 2008-06 PhD
156 p
PDF (3.2 MB)
Billington, Jonathan
121 A high-level petri net specification of the Cambridge Fast Ring M-access service Jonathan Billington 1987-12 31 p
148 Extending coloured petri nets Jonathan Billington 1988-09 82 p PDF (3.5 MB)
222 Extensions to coloured petri nets and their application to protocols Jonathan Billington PhD
190 p
Birrell, Andrew D.
6 System programming in a high level language Andrew D. Birrell PhD
125 p
Birtwistle, Graham
100 Proving a computer correct in higher order logic Jeff Joyce, Graham Birtwistle, Mike Gordon 1986-12 57 p
Bishop, Christipher
464 Feature representation for the automatic analysis of fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 36 p
466 Automatic signal classification in fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 24 p
Bishop, Steve
624 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 1: Overview Steve Bishop, Matthew Fairbairn, et al. 2005-03 88 p PDF (1.3 MB)
625 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 2: The Specification Steve Bishop, Matthew Fairbairn, et al. 2005-03 386 p PDF (2.5 MB)
Biswas, Subir Kumar
351 Handling realtime traffic in mobile networks Subir Kumar Biswas 1994-09 PhD
198 p
PS (0.5 MB)
Black, A.W.
155 Computational morphology of English S.G. Pulman, G.J. Russell, et al. 1989-01 15 p PDF (1.0 MB)
Black, Richard John
219 Fairisle project working documents : Snapshot 1 Ian M. Leslie, Derek M. McAuley, et al. 1991-03 15 p
361 Explicit network scheduling Richard John Black 1995-04 PhD
121 p
PS (0.3 MB)
Blackwell, Alan F.
500 The memorability and security of passwords – some empirical results Jianxin Yan, Alan Blackwell, et al. 2000-09 13 p PDF (0.2 MB)
609 Using camera-phones to interact with context-aware mobile services Eleanor Toye, Anil Madhavapeddy, et al. 2004-12 23 p PDF (0.4 MB)
664 Designing knowledge: An interdisciplinary experiment in research infrastructure for shared description Alan F. Blackwell 2006-04 18 p PDF (0.7 MB)
692 Toward an undergraduate programme in Interdisciplinary Design Alan F. Blackwell 2007-07 13 p PDF (0.2 MB)
760 Radical innovation: crossing knowledge boundaries with interdisciplinary teams Alan F. Blackwell, Lee Wilson, et al. 2009-11 124 p PDF (0.7 MB)
833 Practice-led design and evaluation of a live visual constraint language Alan F. Blackwell, Ignatios Charalampidis 2013-05 16 p PDF (0.3 MB)
855 Mephistophone Patrick K.A. Wollner, Isak Herman, et al. 2014-06 8 p PDF (1.1 MB)
Boguraev, Branimir Konstatinov
11 Automatic resolution of linguistic ambiguities Branimir Konstatinov Boguraev PhD
222 p
PDF (10.9 MB)
17 Three papers on parsing B.K. Boguraev, K. Spärck Jones, J.I. Tait 1982 22 p PDF (1.3 MB)
24 Steps towards natural language to data language translation using general semantic information B.K. Boguraev, K. Spärck Jones 1982-03 8 p PDF (0.5 MB)
32 How to drive a database front end using general semantic information B.K. Boguraev, K. Spärck Jones 1982-11 20 p PDF (1.3 MB)
64 A framework for inference in natural language front ends to databases Branimir K. Boguraev, Karen Spärck Jones 1985-02 73 p
118 Material concerning a study of cases B.K. Boguraev, K. Spärck Jones 1987-05 31 p
127 A development environment for large natural language grammars John Carroll, Bran Boguraev, et al. 1988-02 44 p
162 The Alvey natural language tools grammar (2nd Release) Claire Grover, Ted Briscoe, et al. 1989-04 90 p
Bolingbroke, Maximilian C.
835 Call-by-need supercompilation Maximilian C. Bolingbroke 2013-05 PhD
230 p
PDF (1.6 MB)
Bond, Mike
560 Decimalisation table attacks for PIN cracking Mike Bond, Piotr Zieliński 2003-02 14 p PDF (0.2 MB)
592 Unwrapping the Chrysalis Mike Bond, Daniel Cvrček, Steven J. Murdoch 2004-06 15 p PDF (0.4 MB)
641 Cryptographic processors – a survey Ross Anderson, Mike Bond, et al. 2005-08 19 p PDF (0.6 MB)
644 Robbing the bank with a theorem prover Paul Youn, Ben Adida, et al. 2005-08 26 p PDF (0.2 MB)
666 A pact with the Devil Mike Bond, George Danezis 2006-06 14 p PDF (0.2 MB)
Bonneau, Joseph
817 The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes Joseph Bonneau, Cormac Herley, et al. 2012-03 32 p PDF (0.5 MB)
819 Guessing human-chosen secrets Joseph Bonneau 2012-05 PhD
161 p
PDF (1.7 MB)
Bos, Hendrik Jaap
483 Elastic network control Hendrik Jaap Bos 2000-01 PhD
184 p
Botinčan, Matko
808 Resource-sensitive synchronisation inference by abduction Matko Botinčan, Mike Dodds, Suresh Jagannathan 2012-01 57 p PDF (0.6 MB)
917 Formal verification-driven parallelisation synthesis Matko Botinčan 2018-03 PhD
163 p
PDF (2.0 MB)
Boulton, Charles
760 Radical innovation: crossing knowledge boundaries with interdisciplinary teams Alan F. Blackwell, Lee Wilson, et al. 2009-11 124 p PDF (0.7 MB)
Boulton, Richard John
199 The HOL verification of ELLA designs Richard Boulton, Mike Gordon, et al. 1990-08 22 p PS (0.1 MB)
248 On efficiency in theorem provers which fully expand proofs into primitive inferences Richard J. Boulton 1992-02 23 p DVI (0.0 MB)
254 A HOL semantics for a subset of ELLA Richard J. Boulton 1992-04 104 p DVI (0.1 MB)
337 Efficiency in a fully-expansive theorem prover Richard John Boulton 1994-05 PhD
126 p
DVI (0.2 MB)
390 Syn: a single language for specifiying abstract syntax tress, lexical analysis, parsing and pretty-printing Richard J. Boulton 1996-03 25 p PS (0.1 MB)
DVI (0.0 MB)
405 A tool to support formal reasoning about computer languages Richard J. Boulton 1996-11 21 p PS (0.1 MB)
DVI (0.0 MB)
Bowen, Jonathan P.
350 Ten commandments of formal methods Jonathan P. Bowen, Michael G. Hinchey 1994-09 18 p
357 Seven more myths of formal methods Jonathan P. Bowen, Michael G. Hinchey 1994-12 12 p
Brace-Evans, Lucy G.
710 Event structures with persistence Lucy G. Brace-Evans 2008-02 PhD
113 p
PDF (0.9 MB)
Bradshaw, John Anthony
214 Integrating knowledge of purpose and knowledge of structure for design evaluation J.A. Bradshaw, R.M. Young 1991-02 20 p
236 Using knowledge of purpose and knowledge of structure as a basic for evaluating the behaviour of mechanical systems John Anthony Bradshaw PhD
153 p
Brady, Robert M.
471 Murphy’s law, the fitness of evolving species, and the limits of software reliability Robert M. Brady, Ross J. Anderson, Robin C. Ball 1999-09 14 p PDF (0.2 MB)
Brandão, Pedro
812 Abstracting information on body area networks Pedro Brandão 2012-01 PhD
144 p
PDF (4.8 MB)
Bräuner, Torben
395 Cut-elimination for full intuitionistic linear logic Torben Bräuner, Valeria de Paiva 1996-05 27 p
Braun, Marcelo Bagnulo
849 SNA: Sourceless Network Architecture Marcelo Bagnulo Braun, Jon Crowcroft 2014-03 12 p PDF (0.2 MB)
Breu, Silvia
838 Mining and tracking in evolving software Silvia Breu 2013-06 PhD
104 p
PDF (2.0 MB)
Bridge, Derek G.
237 Computing presuppositions in an incremantal language processing system Derek G. Bridge PhD
212 p
Bridge, James P.
792 Machine learning and automated theorem proving James P. Bridge 2010-11 PhD
180 p
PDF (3.5 MB)
Briscoe, Ted
127 A development environment for large natural language grammars John Carroll, Bran Boguraev, et al. 1988-02 44 p
162 The Alvey natural language tools grammar (2nd Release) Claire Grover, Ted Briscoe, et al. 1989-04 90 p
224 Generalised probabilistic LR parsing of natural language (corpora) with unification-based grammars Ted Briscoe, John Carroll 45 p
233 A development environment for large natural language grammars John Carroll, Ted Briscoe, Claire Grover 1991-07 65 p
238 Proceedings of the ACQUILEX Workshop on Default Inheritance in the lexicon Ted Briscoe, Ann Copestake, Valeria de Paiva 1991-10 180 p
284 The Alvey Natural Language Tools grammar (4th Release) Claire Grover, John Carroll, Ted Briscoe 1993-01 260 p
662 An introduction to tag sequence grammars and the RASP system parser Ted Briscoe 2006-03 30 p PDF (0.3 MB)
790 Automated assessment of ESOL free text examinations Ted Briscoe, Ben Medlock, Øistein Andersen 2010-11 31 p PDF (0.5 MB)
Brooks, Stephen
584 Concise texture editing Stephen Brooks 2004-03 PhD
164 p
PDF (20.0 MB)
Brown, David J.
229 Abstraction of image and pixel : The thistle display system David J. Brown 1991-08 PhD
197 p
Brown, Peter John Cameron
417 Selective mesh refinement for interactive terrain rendering Peter J.C. Brown 1997-02 18 p
490 Selective mesh refinement for rendering Peter John Cameron Brown 2000-04 PhD
179 p
728 A robust efficient algorithm for point location in triangulations Peter J.C. Brown, Christopher T. Faigle 1997-02 16 p PDF (0.3 MB)
Brown, Silas S.
591 Conversion of notations Silas S. Brown 2004-06 PhD
159 p
PDF (2.4 MB)
Bryant, Christopher
894 Issues in preprocessing current datasets for grammatical error correction Christopher Bryant, Mariano Felice 2016-09 15 p PDF (0.4 MB)
Bulian, Jannis
903 Parameterized complexity of distances to sparse graph classes Jannis Bulian 2017-02 PhD
133 p
PDF (1.2 MB)
Bulpin, James R.
619 Operating system support for simultaneous multithreaded processors James R. Bulpin 2005-02 PhD
130 p
PDF (1.3 MB)
Burrows, Michael
138 Authentication: a practical study in belief and action Michael Burrows, Martín Abadi, Roger Needham 1988-06 19 p
153 Efficient data sharing Michael Burrows 1988-12 PhD
99 p
PDF (6.0 MB)
Buttery, Paula J.
675 Computational models for first language acquisition Paula J. Buttery 2006-11 PhD
176 p
PDF (1.3 MB)
915 Annotating errors and disfluencies in transcriptions of speech Andrew Caines, Diane Nicholls, Paula Buttery 2017-12 10 p PDF (0.4 MB)
Caines, Andrew
915 Annotating errors and disfluencies in transcriptions of speech Andrew Caines, Diane Nicholls, Paula Buttery 2017-12 10 p PDF (0.4 MB)
Calvert, Peter R.
871 Architecture-neutral parallelism via the Join Calculus Peter R. Calvert 2015-07 PhD
150 p
PDF (1.2 MB)
Camilleri, Albert John
91 Hardware verification using higher-order logic Albert Camilleri, Mike Gordon, Tom Melham 1986-09 25 p PDF (1.3 MB)
140 Executing behavioural definitions in higher-order logic Albert John Camilleri 1988-07 PhD
183 p
PDF (8.1 MB)
150 Simulation as an aid to verification using the HOL theorem prover Albert John Camilleri 1988-10 23 p PDF (1.7 MB)
Camilleri, Juanito Albert
125 An operational semantics for Occam Juanito Camilleri 1988-02 24 p
144 An operational semantics for occam Juanito Camilleri 1988-08 27 p
157 Introducing a priority operator to CCS Juanito Camilleri 1989-01 19 p
227 Priority in process calculi Juanito Albert Camilleri 1991-06 PhD
203 p
240 Symbolic compilation and execution of programs by proof: a case study in HOL Juanito Camilleri 31 p
264 CCS with environmental guards Juanito Camilleri 1992-08 19 p
265 Reasoning with inductively defined relations in the HOL theorem prover Juanito Camilleri, Tom Melham 1992-08 49 p
Canini, Marco
748 GTVS: boosting the collection of application traffic ground truth Marco Canini, Wei Li, Andrew W. Moore 2009-04 20 p PDF (0.3 MB)
750 AtoZ: an automatic traffic organizer using NetFPGA Marco Canini, Wei Li, et al. 2009-05 27 p PDF (0.8 MB)
Carata, Lucian
859 Resourceful: fine-grained resource accounting for explaining service variability Lucian Carata, Oliver Chick, et al. 2014-09 12 p PDF (0.4 MB)
Cardell-Oliver, Rachel Mary
183 The specification and verification of sliding window protocols in higher order logic Rachel Cardell-Oliver 1989-10 25 p
206 Formal verification of real-time protocols using higher order logic Rachel Cardell-Oliver 1990-08 36 p
255 The formal verification of hard real-time systems Rachel Mary Cardell-Oliver 1992 PhD
151 p
Carreño, Victor A.
279 The transition assertions specification method Victor A. Carreño 18 p
Carroll, John Andrew
33 An island parsing interpreter for Augmented Transition Networks John A. Carroll 1982-10 50 p PDF (1.9 MB)
127 A development environment for large natural language grammars John Carroll, Bran Boguraev, et al. 1988-02 44 p
162 The Alvey natural language tools grammar (2nd Release) Claire Grover, Ted Briscoe, et al. 1989-04 90 p
224 Generalised probabilistic LR parsing of natural language (corpora) with unification-based grammars Ted Briscoe, John Carroll 45 p
233 A development environment for large natural language grammars John Carroll, Ted Briscoe, Claire Grover 1991-07 65 p
284 The Alvey Natural Language Tools grammar (4th Release) Claire Grover, John Carroll, Ted Briscoe 1993-01 260 p
314 Practical unification-based parsing of natural language John Andrew Carroll PhD
173 p
PS (0.3 MB)
Carter, David Maclean
88 A shallow processing approach to anaphor resolution David Maclean Carter 1986-05 PhD
233 p
Carter, Kathleen Anne
87 Computer-aided type face design Kathleen Anne Carter 1986-05 PhD
172 p
PDF (16.5 MB)
Cashman, Thomas J.
773 NURBS-compatible subdivision surfaces Thomas J. Cashman 2010-03 PhD
99 p
colour
PDF (6.1 MB)
Castle, Oliver M.
382 Synthetic image generation for a multiple-view autostereo display Oliver M. Castle 1995-10 PhD
184 p
Cater, Arthur William Sebright
19 Analysis and inference for English Arthur William Sebright Cater 1981-09 PhD
223 p
Cattani, Gian Luca
477 Presheaf models for CCS-like languages Gian Luca Cattani, Glynn Winskel 1999-11 46 p
496 Contexts and embeddings for closed shallow action graphs Gian Luca Cattani, James J. Leifer, Robin Milner 2000-07 56 p PS (0.2 MB)
505 Models for name-passing processes: interleaving and causal Gian Luca Cattani, Peter Sewell 2000-09 42 p PDF (0.5 MB)
PS (0.2 MB)
DVI (0.1 MB)
Caulfield, Ian
707 Complexity-effective superscalar embedded processors using instruction-level distributed processing Ian Caulfield 2007-12 PhD
130 p
PDF (0.7 MB)
Cawsey, Alison
243 Automating the librarian: a fundamental approach using belief revision Alison Cawsey, Julia Galliers, et al. 1992-01 39 p
339 Belief revision and dialogue management in information retrieval Brian Logan, Steven Reece, et al. 1994-05 227 p PDF (13.3 MB)
Chadwick, Gregory A.
832 Communication centric, multi-core, fine-grained processor architecture Gregory A. Chadwick 2013-04 PhD
165 p
PDF (1.2 MB)
Chaintreau, Augustin
617 Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding Augustin Chaintreau, Pan Hui, et al. 2005-02 26 p PDF (0.8 MB)
Challis, M.F.
1 The JACKDAW database package M.F. Challis 1974-10 15 p PDF (0.8 MB)
Chan, Shu-Yan
749 Identifying social communities in complex communications for network efficiency Pan Hui, Eiko Yoneki, et al. 2009-05 14 p PDF (0.7 MB)
Charalampidis, Ignatios
833 Practice-led design and evaluation of a live visual constraint language Alan F. Blackwell, Ignatios Charalampidis 2013-05 16 p PDF (0.3 MB)
Chau, Chi-Kin
708 IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks Chi-Kin Chau, Jon Crowcroft, et al. 2008-01 24 p PDF (0.3 MB)
Chesterfield, Julian
626 Landmark Guided Forwarding: A hybrid approach for Ad Hoc routing Meng How Lim, Adam Greenhalgh, et al. 2005-03 28 p PDF (0.4 MB)
629 Hybrid routing: A pragmatic approach to mitigating position uncertainty in geo-routing Meng How Lim, Adam Greenhalgh, et al. 2005-04 26 p PDF (0.4 MB)
Chick, Oliver
859 Resourceful: fine-grained resource accounting for explaining service variability Lucian Carata, Oliver Chick, et al. 2014-09 12 p PDF (0.4 MB)
Chisnall, David
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
851 Capability Hardware Enhanced RISC Instructions: CHERI User’s guide Robert N.M. Watson, David Chisnall, et al. 2014-04 26 p PDF (0.4 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
853 Bluespec Extensible RISC Implementation: BERI Software reference Robert N.M. Watson, David Chisnall, et al. 2014-04 34 p PDF (0.9 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
869 Bluespec Extensible RISC Implementation: BERI Software reference Robert N. M. Watson, David Chisnall, et al. 2015-04 27 p PDF (0.9 MB)
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
877 Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide Robert N. M. Watson, David Chisnall, et al. 2015-09 58 p PDF (0.4 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
Choi, Hyun-Jin
657 Security protocol design by composition Hyun-Jin Choi 2006-01 PhD
155 p
PDF (0.9 MB)
Choquette, Martin
519 Local evidence in document retrieval Martin Choquette 2001-08 PhD
177 p
Choudary, Marios O.
827 The smart card detective: a hand-held EMV interceptor Omar S. Choudary 2012-12 55 p PDF (2.8 MB)
878 Efficient multivariate statistical techniques for extracting secrets from electronic devices Marios O. Choudary 2015-09 PhD
164 p
PDF (14.1 MB)
Christianson, Bruce
445 Secure sessions from weak secrets Michael Roe, Bruce Christianson, David Wheeler 1998-07 12 p PDF (1.0 MB)
Chuang, Shaw-Cheng
384 Securing ATM networks Shaw-Cheng Chuang 1995-01 30 p PS (0.2 MB)
Clarke, James Thomas Woodchurch
174 General theory relating to the implementation of concurrent symbolic computation James Thomas Woodchurch Clarke 1989-08 PhD
113 p
Clarke, Thomas
197 The semantics and implementation of aggregates : or : how to express concurrency without destroying determinism Thomas Clarke 1990-07 25 p
Clarke, T.J.W.
176 Implementing aggregates in parallel functional languages T.J.W. Clarke 1989-08 13 p
Clayton, Richard
653 Anonymity and traceability in cyberspace Richard Clayton 2005-11 PhD
189 p
PDF (1.7 MB)
Clocksin, William
72 Logic programming and the specification of circuits W.F. Clocksin 13 p
360 On the calculation of explicit polymetres W.F. Clocksin 1995-03 12 p PDF (0.8 MB)
436 A new method for estimating optical flow W.F. Clocksin 1997-11 20 p PDF (1.5 MB)
464 Feature representation for the automatic analysis of fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 36 p
466 Automatic signal classification in fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 24 p
Clulow, Jolyon
641 Cryptographic processors – a survey Ross Anderson, Mike Bond, et al. 2005-08 19 p PDF (0.6 MB)
644 Robbing the bank with a theorem prover Paul Youn, Ben Adida, et al. 2005-08 26 p PDF (0.2 MB)
Coble, Aaron R.
785 Anonymity, information, and machine-assisted proof Aaron R. Coble 2010-07 PhD
171 p
PDF (1.1 MB)
Coen, Martin David
272 Interactive program derivation Martin David Coen 1992-11 PhD
100 p
PDF (0.6 MB)
DVI (0.1 MB)
Cohn, A.
21 The correctness of a precedence parsing algorithm in LCF A. Cohn 1982-04 38 p PDF (1.8 MB)
Cohn, Avra
20 On using Edinburgh LCF to prove the correctness of a parsing algorithm Avra Cohn, Robin Milner 1982-02 23 p PDF (1.2 MB)
94 A mechanized proof of correctness of a simple counter Avra Cohn, Mike Gordon 1986-06 80 p
104 A proof of correctness of the Viper microprocessor: the first level Avra Cohn 1987-01 46 p PDF (2.3 MB)
134 Correctness properties of the Viper black model: the second level Avra Cohn 1988-05 114 p
Contrastin, Mistral
911 Proofs for ‘Verifying Spatial Properties of Array Computations’ Dominic Orchard, Mistral Contrastin, et al. 2017-09 8 p PDF (0.5 MB)
Cook, Byron
788 Branching-time reasoning for programs (extended version) Byron Cook, Eric Koskinen, Moshe Vardi 2011-07 38 p PDF (0.9 MB)
789 Making prophecies with decision predicates Byron Cook, Eric Koskinen 2010-11 29 p PDF (0.6 MB)
Cook, Douglas John
9 Evaluation of a protection system Douglas John Cook PhD
181 p
Cooper, R.C.B.
76 Preserving abstraction in concurrent programming R.C.B. Cooper, K.G. Hamilton 16 p
Cooper, Robert
119 Pilgrim: a debugger for distributed systems Robert Cooper 1987-07 19 p
Cooper, Robert Charles Beaumont
128 Debugging concurrent and distributed programs Robert Charles Beaumont Cooper 1988-02 PhD
111 p
PDF (5.9 MB)
Copestake, Ann
163 Inference in a natural language front end for databases Ann Copestake, Karen Spärck Jones 1989-02 87 p PDF (0.5 MB)
187 Natural language interfaces to databases Ann Copestake, Karen Spärck Jones 1989-09 36 p PS (0.1 MB)
190 Some notes on mass terms and plurals Ann Copestake 1990-01 65 p PS (0.1 MB)
238 Proceedings of the ACQUILEX Workshop on Default Inheritance in the lexicon Ted Briscoe, Ann Copestake, Valeria de Paiva 1991-10 180 p
316 The Compleat LKB Ann Copestake 1993-08 126 p PS (0.3 MB)
Coquand, Thierry
107 DI-domains as a model of polymorphism Thierry Coquand, Carl Gunter, Glynn Winskel 1987-05 19 p
116 Domain theoretic models of polymorphism Thierry Coquand, Carl Gunter, Glynn Winskel 1987-09 52 p
Corella, Francisco
232 Mechanising set theory Francisco Corella 1991-07 PhD
217 p
PDF (9.6 MB)
Cottingham, David N.
741 Vehicular wireless communication David N. Cottingham 2009-01 PhD
264 p
PDF (3.6 MB)
Crabtree, I.B.
154 A natural language interface to an intelligent planning system I.B. Crabtree, R.S. Crouch, et al. 1989-01 14 p
Craft, Daniel Hammond
73 Resource management in a distributed computing system Daniel Hammond Craft PhD
116 p
Crawley, Stephen Christopher
86 The Entity System: an object based filing system Stephen Christopher Crawley 1986-04 PhD
120 p
Crole, Roy Luis
204 New foundations for fixpoint computations: FIX-hyperdoctrines and the FIX-logic Roy L. Crole, Andrew M. Pitts 1990-08 37 p PS (0.1 MB)
247 Programming metalogics with a fixpoint type Roy Luis Crole 1992-02 PhD
164 p
Crosby, Simon Andrew
393 Performance management in ATM networks Simon Andrew Crosby 1996-04 PhD
215 p
PS (0.9 MB)
Crouch, Richard
154 A natural language interface to an intelligent planning system I.B. Crabtree, R.S. Crouch, et al. 1989-01 14 p
325 The temporal properties of English conditionals and modals Richard Crouch 1994-01 PhD
248 p
PDF (16.2 MB)
Crowcroft, Jon
554 Towards a field theory for networks Jon Crowcroft 2003-01 9 p PDF (0.4 MB)
555 BOURSE – Broadband Organisation of Unregulated Radio Systems through Economics Jon Crowcroft, Richard Gibbens, Stephen Hailes 2003-01 10 p PDF (0.2 MB)
556 Turing Switches – Turing machines for all-optical Internet routing Jon Crowcroft 2003-01 7 p PDF (0.2 MB)
617 Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding Augustin Chaintreau, Pan Hui, et al. 2005-02 26 p PDF (0.8 MB)
626 Landmark Guided Forwarding: A hybrid approach for Ad Hoc routing Meng How Lim, Adam Greenhalgh, et al. 2005-03 28 p PDF (0.4 MB)
629 Hybrid routing: A pragmatic approach to mitigating position uncertainty in geo-routing Meng How Lim, Adam Greenhalgh, et al. 2005-04 26 p PDF (0.4 MB)
631 MIRRORS: An integrated framework for capturing real world behaviour for models of ad hoc networks Wenjun Hu, Jon Crowcroft 2005-04 16 p PDF (0.5 MB)
650 Parallel iterative solution method for large sparse linear equation systems Rashid Mehmood, Jon Crowcroft 2005-10 22 p PDF (1.9 MB)
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
684 Bubble Rap: Forwarding in small world DTNs in ever decreasing circles Pan Hui, Jon Crowcroft 2007-05 44 p PDF (1.0 MB)
703 Lazy Susan: dumb waiting as proof of work Jon Crowcroft, Tim Deegan, et al. 2007-11 23 p PDF (0.3 MB)
708 IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks Chi-Kin Chau, Jon Crowcroft, et al. 2008-01 24 p PDF (0.3 MB)
747 An estimator of forward and backward delay for multipath transport Fei Song, Hongke Zhang, et al. 2009-03 16 p PDF (0.8 MB)
749 Identifying social communities in complex communications for network efficiency Pan Hui, Eiko Yoneki, et al. 2009-05 14 p PDF (0.7 MB)
753 Carbon: trusted auditing for P2P distributed virtual environments John L. Miller, Jon Crowcroft 2009-08 20 p PDF (0.8 MB)
767 Ising model of rumour spreading in interacting communities Massimo Ostilli, Eiko Yoneki, et al. 2010-01 24 p PDF (3.2 MB)
814 The free Internet: a distant mirage or near reality? Arjuna Sathiaseelan, Jon Crowcroft 2012-02 10 p PDF (0.1 MB)
837 Human-data interaction Hamed Haddadi, Richard Mortier, et al. 2013-06 9 p PDF (0.4 MB)
841 Information centric delay tolerant networking: an internet architecture for the challenged Arjuna Sathiaseelan, Dirk Trossen, et al. 2013-09 11 p PDF (0.2 MB)
849 SNA: Sourceless Network Architecture Marcelo Bagnulo Braun, Jon Crowcroft 2014-03 12 p PDF (0.2 MB)
863 Regional clouds: technical considerations Jatinder Singh, Jean Bacon, et al. 2014-11 18 p PDF (0.6 MB)
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
Cunningham, Paul Alexander
587 Verification of asynchronous circuits Paul Alexander Cunningham 2004-04 PhD
174 p
PDF (1.5 MB)
Curzon, Paul
215 A structured approach to the verification of low level microcode Paul Curzon PhD
265 p
PDF (12.0 MB)
274 Of what use is a verified compiler specification? Paul Curzon 23 p
311 A verified Vista implementation Paul Curzon 1993-09 56 p
328 The formal verification of the Fairisle ATM switching element: an overview Paul Curzon 1994-03 46 p
329 The formal verification of the Fairisle ATM switching element Paul Curzon 1994-03 105 p
Cvrček, Daniel
592 Unwrapping the Chrysalis Mike Bond, Daniel Cvrček, Steven J. Murdoch 2004-06 15 p PDF (0.4 MB)
Dalibard, Valentin
823 Mitigating I/O latency in SSD-based graph traversal Amitabha Roy, Karthik Nilakant, et al. 2012-11 27 p PDF (0.3 MB)
900 A framework to build bespoke auto-tuners with structured Bayesian optimisation Valentin Dalibard 2017-02 PhD
182 p
PDF (2.6 MB)
Danezis, George
594 Designing and attacking anonymous communication systems George Danezis 2004-07 PhD
150 p
PDF (1.5 MB)
666 A pact with the Devil Mike Bond, George Danezis 2006-06 14 p PDF (0.2 MB)
Danish, Matthew
911 Proofs for ‘Verifying Spatial Properties of Array Computations’ Dominic Orchard, Mistral Contrastin, et al. 2017-09 8 p PDF (0.5 MB)
Danka, Miklos
768 Report on existing open-source electronic medical records Cecily Morrison, Adona Iosif, Miklos Danka 2010-02 12 p
colour
PDF (1.1 MB)
Daugman, John
482 Biometric decision landscapes John Daugman 2000-01 15 p PDF (0.3 MB)
635 Results from 200 billion iris cross-comparisons John Daugman 2005-06 8 p PDF (0.2 MB)
640 Combining cryptography with biometrics effectively Feng Hao, Ross Anderson, John Daugman 2005-07 17 p PDF (0.2 MB)
685 Effect of severe image compression on iris recognition performance John Daugman, Cathryn Downing 2007-05 20 p PDF (0.4 MB)
Davies, Jonathan J.
761 Programming networks of vehicles Jonathan J. Davies 2009-11 PhD
292 p
PDF (4.7 MB)
Davis, Brooks
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
851 Capability Hardware Enhanced RISC Instructions: CHERI User’s guide Robert N.M. Watson, David Chisnall, et al. 2014-04 26 p PDF (0.4 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
853 Bluespec Extensible RISC Implementation: BERI Software reference Robert N.M. Watson, David Chisnall, et al. 2014-04 34 p PDF (0.9 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
869 Bluespec Extensible RISC Implementation: BERI Software reference Robert N. M. Watson, David Chisnall, et al. 2015-04 27 p PDF (0.9 MB)
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
877 Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide Robert N. M. Watson, David Chisnall, et al. 2015-09 58 p PDF (0.4 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
Deegan, Tim
703 Lazy Susan: dumb waiting as proof of work Jon Crowcroft, Tim Deegan, et al. 2007-11 23 p PDF (0.3 MB)
de Lara, Eyal
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
Denman, William
910 Automated verification of continuous and hybrid dynamical systems William Denman 2017-07 PhD
178 p
PDF (3.5 MB)
de Paiva, Valeria Correa Vaz
203 Subtyping in Ponder (preliminary report) Valeria C.V. de Paiva 1990-08 35 p PDF (1.5 MB)
213 The Dialectica categories Valeria Correa Vaz de Paiva 1991-01 PhD
82 p
PDF (3.5 MB)
225 Categorical multirelations, linear logic and petri nets (draft) Valeria de Paiva 1991-05 29 p PDF (1.2 MB)
238 Proceedings of the ACQUILEX Workshop on Default Inheritance in the lexicon Ted Briscoe, Ann Copestake, Valeria de Paiva 1991-10 180 p
262 Term assignment for intuitionistic linear logic (preliminary report) Nick Benton, Gavin Bierman, Valeria de Paiva 1992-08 57 p
365 Computational types from a logical perspective I P.N. Benton, G.M. Bierman, V.C.V. de Paiva 1995-05 19 p
395 Cut-elimination for full intuitionistic linear logic Torben Bräuner, Valeria de Paiva 1996-05 27 p
De, Swades
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
Dhanjal, Seema
464 Feature representation for the automatic analysis of fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 36 p
465 Gelfish – graphical environment for labelling FISH images Boaz Lerner, Seema Dhanjal, Maj Hultén 1999-05 20 p
466 Automatic signal classification in fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 24 p
Dhingra, Inderpreet-Singh
151 Formalising an integrated circuit design style in higher order logic Inderpreet-Singh Dhingra 1988-11 PhD
195 p
PDF (9.0 MB)
Dhingra, I.S.
115 Formal validation of an integrated circuit design style I.S. Dhingra 1987-08 29 p
Dimmock, Nathan E.
643 Using trust and risk for access control in Global Computing Nathan E. Dimmock 2005-08 PhD
145 p
PDF (1.8 MB)
Dinsdale-Young, Thomas
777 Concurrent Abstract Predicates Thomas Dinsdale-Young, Mike Dodds, et al. 2010-04 43 p PDF (0.5 MB)
Dion, Jeremy
16 Reliable storage in a local network Jeremy Dion 1981-02 PhD
142 p
PDF (1.8 MB)
Diot, Christophe
617 Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding Augustin Chaintreau, Pan Hui, et al. 2005-02 26 p PDF (0.8 MB)
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
Dixon, Michael J.
245 System support for multi-service traffic Michael J. Dixon 1992-01 PhD
108 p
PDF (7.3 MB)
Doar, John Matthew Simon
219 Fairisle project working documents : Snapshot 1 Ian M. Leslie, Derek M. McAuley, et al. 1991-03 15 p
298 Multicast in the asynchronous transfer mode environment John Matthew Simon Doar 1993-04 PhD
168 p
PS (0.5 MB)
Dodds, Mike
736 Deny-guarantee reasoning Mike Dodds, Xinyu Feng, et al. 2009-01 82 p PDF (0.6 MB)
774 Explicit stabilisation for modular rely-guarantee reasoning John Wickerson, Mike Dodds, Matthew Parkinson 2010-03 29 p PDF (0.9 MB)
777 Concurrent Abstract Predicates Thomas Dinsdale-Young, Mike Dodds, et al. 2010-04 43 p PDF (0.5 MB)
808 Resource-sensitive synchronisation inference by abduction Matko Botinčan, Mike Dodds, Suresh Jagannathan 2012-01 57 p PDF (0.6 MB)
Dodgson, Neil Anthony
261 Image resampling Neil Anthony Dodgson 1992-08 PhD
264 p
PDF (5.1 MB)
398 Design and implementation of an autostereoscopic camera system N.A. Dodgson, J.R. Moore 1996-06 20 p PDF (0.3 MB)
520 Ternary and three-point univariate subdivision schemes Mohamed Hassan, Neil A. Dodgson 2001-09 8 p PDF (0.1 MB)
539 Towards a ternary interpolating subdivision scheme for the triangular mesh N.A. Dodgson, M.A. Sabin, et al. 2002-07 12 p PDF (0.2 MB)
540 The use of computer graphics rendering software in the analysis of a novel autostereoscopic display design N.A. Dodgson, J.R. Moore 2002-08 6 p PDF (0.2 MB)
541 Different applications of two-dimensional potential fields for volume modeling L. Barthe, N.A. Dodgson, et al. 2002-08 26 p PDF (1.9 MB)
542 A generative classification of mesh refinement rules with lattice transformations I.P. Ivrissimtzis, N.A. Dodgson, M.A. Sabin 2002-09 13 p PDF (0.2 MB)
544 On the support of recursive subdivision I.P. Ivrissimtzis, M.A. Sabin, N.A. Dodgson 2002-09 20 p PDF (4.0 MB)
562 Fast Marching farthest point sampling Carsten Moenning, Neil A. Dodgson 2003-04 16 p PDF (0.5 MB)
565 Fast Marching farthest point sampling for point clouds and implicit surfaces Carsten Moenning, Neil A. Dodgson 2003-05 15 p PDF (0.5 MB)
583 Subdivision as a sequence of sampled Cp surfaces and conditions for tuning schemes Cédric Gérot, Loïc Barthe, et al. 2004-03 68 p PDF (0.5 MB)
611 An heuristic analysis of the classification of bivariate subdivision schemes Neil A. Dodgson 2004-12 18 p PDF (0.3 MB)
649 The decolorize algorithm for contrast enhancing, color to grayscale conversion Mark Grundland, Neil A. Dodgson 2005-10 15 p
colour
PDF (12.2 MB)
689 Removing polar rendering artifacts in subdivision surfaces Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin 2007-06 7 p PDF (0.5 MB)
691 Preconditions on geometrically sensitive subdivision schemes Neil A. Dodgson, Malcolm A. Sabin, Richard Southern 2007-08 13 p PDF (0.5 MB)
699 A smooth manifold based construction of approximating lofted surfaces Richard Southern, Neil A. Dodgson 2007-10 17 p PDF (1.8 MB)
755 Skin-detached surface for interactive large mesh editing Yujian Gao, Aimin Hao, et al. 2009-09 18 p PDF (1.1 MB)
Donnelly, Austin
534 Resource control in network elements Austin Donnelly 2002-04 PhD
183 p
PDF (1.0 MB)
Downing, Cathryn
685 Effect of severe image compression on iris recognition performance John Daugman, Cathryn Downing 2007-05 20 p PDF (0.4 MB)
Dragovic, Boris
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
Drimer, Saar
711 Thinking inside the box: system-level failures of tamper proofing Saar Drimer, Steven J. Murdoch, Ross Anderson 2008-02 37 p PDF (5.4 MB)
763 Security for volatile FPGAs Saar Drimer 2009-11 PhD
169 p
PDF (3.2 MB)
Edge, Darren
733 Tangible user interfaces for peripheral interaction Darren Edge 2008-12 PhD
237 p
PDF (8.6 MB)
el Kaliouby, Rana Ayman
636 Mind-reading machines: automated inference of complex mental states Rana Ayman el Kaliouby 2005-07 PhD
185 p
PDF (24.3 MB)
Elworthy, David Alan Howard
289 The semantics of noun phrase anaphora David Alan Howard Elworthy 1993-02 PhD
191 p
Ennals, Robert J.
578 Linear types for packet processing (extended version) Robert Ennals, Richard Sharp, Alan Mycroft 2004-01 31 p PDF (0.3 MB)
730 Adaptive evaluation of non-strict programs Robert J. Ennals 2008-08 PhD
243 p
PDF (2.7 MB)
Ernoult, Christine
267 Untyped strictness analysis Christine Ernoult, Alan Mycroft 13 p
Evers, David Martin
332 Distributed computing with objects David Martin Evers 1994-03 PhD
154 p
Eyers, David M.
669 Active privilege management for distributed access control systems David M. Eyers 2006-06 PhD
222 p
PDF (1.9 MB)
Eyole-Monono, Mbou
722 Energy-efficient sentient computing Mbou Eyole-Monono 2008-07 PhD
138 p
PDF (4.2 MB)
Faggian, Claudia
535 Designs, disputes and strategies Claudia Faggian, Martin Hyland 2002-05 21 p PDF (0.3 MB)
Faigle, Christopher T.
728 A robust efficient algorithm for point location in triangulations Peter J.C. Brown, Christopher T. Faigle 1997-02 16 p PDF (0.3 MB)
Fairbairn, Jon
31 Ponder and its type system J. Fairbairn 1982-11 42 p PDF (1.4 MB)
53 A new type-checker for a functional language Jon Fairbairn 1984-07 16 p PDF (1.2 MB)
75 Design and implementation of a simple typed language based on the lambda-calculus Jon Fairbairn 1985-05 PhD
107 p
PDF (0.6 MB)
89 Making form follow function : An exercise in functional programming style Jon Fairbairn 1986-06 9 p PDF (0.4 MB)
171 Some types with inclusion properties in ∀, →, μ Jon Fairbairn 1989-06 10 p PDF (0.2 MB)
Fairbairn, Matthew
624 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 1: Overview Steve Bishop, Matthew Fairbairn, et al. 2005-03 88 p PDF (1.3 MB)
625 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 2: The Specification Steve Bishop, Matthew Fairbairn, et al. 2005-03 386 p PDF (2.5 MB)
Fairbanks, Scott
738 High precision timing using self-timed circuits Scott Fairbanks 2009-01 PhD
99 p
PDF (13.2 MB)
Fay, Damien
725 Beyond node degree: evaluating AS topology models Hamed Haddadi, Damien Fay, et al. 2008-07 16 p PDF (1.0 MB)
729 Weighted spectral distribution Damien Fay, Hamed Haddadi, et al. 2008-09 13 p PDF (0.2 MB)
756 Analysis of the Internet’s structural evolution Hamed Haddadi, Damien Fay, et al. 2009-09 13 p PDF (0.3 MB)
806 On joint diagonalisation for dynamic network analysis Damien Fay, Jérôme Kunegis, Eiko Yoneki 2011-10 12 p PDF (0.8 MB)
Fedder, Lee
182 The theory and implementation of a bidirectional question answering system John M. Levine, Lee Fedder 1989-10 27 p
Feigin, Boris
797 Interpretational overhead in system software Boris Feigin 2011-04 PhD
116 p
PDF (1.2 MB)
Felice, Mariano
894 Issues in preprocessing current datasets for grammatical error correction Christopher Bryant, Mariano Felice 2016-09 15 p PDF (0.4 MB)
895 Artificial error generation for translation-based grammatical error correction Mariano Felice 2016-10 PhD
155 p
PDF (1.2 MB)
Feng, Huang
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
Feng, Xinyu
736 Deny-guarantee reasoning Mike Dodds, Xinyu Feng, et al. 2009-01 82 p PDF (0.6 MB)
Ferguson, Innes A.
250 TouringMachines: autonomous agents with attitudes Innes A. Ferguson 1992-04 19 p PS (0.1 MB)
273 TouringMachines: an architecture for dynamic, rational, mobile agents Innes A. Ferguson 1992-11 PhD
206 p
PDF (2.0 MB)
PS (0.4 MB)
Fleuriot, Jacques Désiré
442 A combination of nonstandard analysis and geometry theorem proving, with application to Newton’s Principia Jacques Fleuriot, Lawrence C. Paulson 1998-01 13 p PS (0.1 MB)
DVI (0.0 MB)
469 A combination of geometry theorem proving and nonstandard analysis, with application to Newton’s Principia Jacques Désiré Fleuriot 1999-08 PhD
135 p
Foote, J.T.
335 Video mail retrieval using voice: report on keyword definition and data collection (deliverable report on VMR task No. 1) G.J.F. Jones, J.T. Foote, et al. 1994-04 38 p PDF (1.7 MB)
366 Retrieving spoken documents: VMR Project experiments K. Spärck Jones, G.J.F. Jones, et al. 1995-05 28 p
402 Video mail retrieval using voice: report on collection of naturalistic requests and relevance assessments G.J.F. Jones, J.T. Foote, et al. 1996-09 21 p
430 Video mail retrieval using voice : Report on topic spotting G.J.F. Jones, J.T. Foote, et al. 1997-07 73 p
Fournier, Jacques Jean-Alain
701 Vector microprocessors for cryptography Jacques Jean-Alain Fournier 2007-10 PhD
174 p
PDF (1.7 MB)
Fox, Anthony C.J.
512 An algebraic framework for modelling and verifying microprocessors using HOL Anthony Fox 2001-03 24 p PDF (0.3 MB)
545 A HOL specification of the ARM instruction set architecture Anthony C.J. Fox 2001-06 45 p PDF (0.4 MB)
548 Formal verification of the ARM6 micro-architecture Anthony Fox 2002-11 59 p PDF (0.5 MB)
Fox, Paul J.
830 Massively parallel neural computation Paul J. Fox 2013-03 PhD
105 p
PDF (2.3 MB)
Francis, Rosemary M.
828 Exploring networks-on-chip for FPGAs Rosemary M. Francis 2013-01 PhD
121 p
PDF (1.7 MB)
Frankau, Simon
824 Hardware synthesis from a stream-processing functional language Simon Frankau 2012-11 PhD
202 p
PDF (1.3 MB)
Fraser, Keir A.
510 Switchlets and resource-assured MPLS networks Richard Mortier, Rebecca Isaacs, Keir Fraser 2000-05 16 p PDF (0.1 MB)
PS (0.1 MB)
552 The Xenoserver computing infrastructure Keir A. Fraser, Steven M. Hand, et al. 2003-01 11 p PDF (0.2 MB)
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
579 Practical lock-freedom Keir Fraser 2004-02 PhD
116 p
PDF (0.7 MB)
596 Reconstructing I/O Keir Fraser, Steven Hand, et al. 2004-08 16 p PDF (0.3 MB)
Freeman, Stephen Martin Guy
342 An architecture for distributed user interfaces Stephen Martin Guy Freeman 1994-07 PhD
127 p
PDF (8.1 MB)
Frost, Jacob
308 A case study of co-induction in Isabelle HOL Jacob Frost 1993-08 27 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
359 A case study of co-induction in Isabelle Jacob Frost 1995-02 48 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.1 MB)
Gaildrat, V.
541 Different applications of two-dimensional potential fields for volume modeling L. Barthe, N.A. Dodgson, et al. 2002-08 26 p PDF (1.9 MB)
Gain, James Edward
499 Enhancing spatial deformation for virtual sculpting James Edward Gain 2000-08 PhD
161 p
PDF (13.4 MB)
Galliers, J.
230 Proceedings of the Second Belief Representation and Agent Architectures Workshop (BRAA ’91) J. Galliers 1991-08 255 p
Galliers, J.R.
291 Evaluating natural language processing systems J.R. Galliers, K. Spärck Jones 1993-02 187 p PS (0.2 MB)
Galliers, Julia
243 Automating the librarian: a fundamental approach using belief revision Alison Cawsey, Julia Galliers, et al. 1992-01 39 p
339 Belief revision and dialogue management in information retrieval Brian Logan, Steven Reece, et al. 1994-05 227 p PDF (13.3 MB)
Galliers, Julia Rose
172 A theoretical framework for computer models of cooperative dialogue, acknowledging multi-agent conflict Julia Rose Galliers 1989-07 226 p
193 Belief revision and a theory of communication Julia Rose Galliers 1990-05 30 p
194 Proceedings of the First Belief Representation and Agent Architectures Workshop Julia Rose Galliers 1990-03 199 p
Gamback, Bjorn
299 Pragmatic reasoning in bridge Bjorn Gamback, Manny Rayner, Barney Pell 1993-04 23 p PS (0.1 MB)
Gao, Chao
901 Signal maps for smartphone localisation Chao Gao 2017-02 PhD
127 p
PDF (23.7 MB)
Gao, Yujian
755 Skin-detached surface for interactive large mesh editing Yujian Gao, Aimin Hao, et al. 2009-09 18 p PDF (1.1 MB)
Gardner, Philippa
777 Concurrent Abstract Predicates Thomas Dinsdale-Young, Mike Dodds, et al. 2010-04 43 p PDF (0.5 MB)
Garnett, Nicholas Henry
46 Intelligent network interfaces Nicholas Henry Garnett PhD
140 p
Gasperin, Caroline V.
764 Statistical anaphora resolution in biomedical texts Caroline V. Gasperin 2009-12 PhD
124 p
PDF (1.8 MB)
Gass, Richard
617 Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding Augustin Chaintreau, Pan Hui, et al. 2005-02 26 p PDF (0.8 MB)
Geiß, Johanna
802 Latent semantic sentence clustering for multi-document summarization Johanna Geiß 2011-07 PhD
156 p
PDF (1.0 MB)
Gérot, Cédric
583 Subdivision as a sequence of sampled Cp surfaces and conditions for tuning schemes Cédric Gérot, Loïc Barthe, et al. 2004-03 68 p PDF (0.5 MB)
Gibbens, Richard
555 BOURSE – Broadband Organisation of Unregulated Radio Systems through Economics Jon Crowcroft, Richard Gibbens, Stephen Hailes 2003-01 10 p PDF (0.2 MB)
676 Road traffic analysis using MIDAS data: journey time prediction R.J. Gibbens, Y. Saacti 2006-12 35 p PDF (4.6 MB)
Giechaskiel, Ilias
866 PDTL: Parallel and distributed triangle listing for massive graphs Ilias Giechaskiel, George Panagopoulos, Eiko Yoneki 2015-04 14 p PDF (0.5 MB)
Gillies, Mark F.P.
522 Practical behavioural animation based on vision and attention Mark F.P. Gillies 2001-09 187 p PDF (11.7 MB)
PS (10.1 MB)
Girling, Christopher Gray
37 Representation and authentication on computer networks Christopher Gray Girling PhD
154 p
Gladwin, Philip
223 Shallow processing and automatic summarising: a first study Philip Gladwin, Stephen Pulman, Karen Spärck Jones 1991-05 65 p
Goel, Ashvin
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
Gong, Li
164 A matrix key distribution system Li Gong, David J. Wheeler 1988-10 20 p PDF (1.0 MB)
Gordon, Andrew
160 PFL+: A Kernal Scheme for Functions I/O Andrew Gordon 1989-02 26 p
Gordon, Andrew Donald
285 Functional programming and input/output Andrew Donald Gordon 1993-02 PhD
163 p
287 A mechanised definition of Silage in HOL Andrew D. Gordon 1993-02 28 p DVI (0.0 MB)
386 Bisimilarity for a first-order calculus of objects with subtyping Andrew D. Gordon, Gareth D. Rees 1996-01 78 p
414 A calculus for cryptographic protocols : The SPI calculus Martín Abadi, Andrew D. Gordon 1997-01 105 p PS (0.3 MB)
429 Compilation and equivalence of imperative objects Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen 1997-06 64 p PS (0.2 MB)
DVI (0.1 MB)
457 A concurrent object calculus: reduction and typing Andrew D. Gordon, Paul D. Hankin 1999-02 63 p
Gordon, Michael J.C.
41 LCF_LSM, A system for specifying and verifying hardware Mike Gordon 1983-09 53 p PDF (2.5 MB)
42 Proving a computer correct with the LCF_LSM hardware verification system Mike Gordon 1983-09 49 p PDF (2.1 MB)
66 A formal hardware verification methodology and its application to a network interface chip M.J.C. Gordon, J. Herbert 35 p
68 HOL : A machine oriented formulation of higher order logic Mike Gordon 1985-07 52 p
74 Hardware verification by formal proof Mike Gordon 6 p
77 Why higher-order logic is a good formalisation for specifying and verifying hardware Mike Gordon 1985-08 28 p
91 Hardware verification using higher-order logic Albert Camilleri, Mike Gordon, Tom Melham 1986-09 25 p PDF (1.3 MB)
94 A mechanized proof of correctness of a simple counter Avra Cohn, Mike Gordon 1986-06 80 p
100 Proving a computer correct in higher order logic Jeff Joyce, Graham Birtwistle, Mike Gordon 1986-12 57 p
103 HOL : A proof generating system for higher-order logic Mike Gordon 1987-01 56 p
145 Mechanizing programming logics in higher order logic Michael J.C. Gordon 1988-09 55 p PDF (0.5 MB)
199 The HOL verification of ELLA designs Richard Boulton, Mike Gordon, et al. 1990-08 22 p PS (0.1 MB)
353 Merging HOL with set theory Mike Gordon 1994-11 40 p PDF (1.5 MB)
480 Programming combinations of deduction and BDD-based symbolic calculation Mike Gordon 1999-12 24 p
481 Combining the Hol98 proof assistant with the BuDDy BDD package Mike Gordon, Ken Friis Larsen 1999-12 71 p
Gordon, Minor E.
781 Stage scheduling for CPU-intensive servers Minor E. Gordon 2010-06 PhD
119 p
PDF (0.9 MB)
Gore, Rajeev
288 Cut-free sequent and tableau systems for propositional Diodorean modal logics Rajeev Gore 1993-02 19 p
Goré, Rajeev Prakhakar
257 Cut-free sequent and tableau systems for propositional normal modal logics Rajeev Prakhakar Goré 1992-05 160 p PDF (9.7 MB)
Gorrell, Genevive
491 Is hypothesis testing useful for subcategorization acquisition? Anna Korhonen, Genevive Gorrell, Diana McCarthy 2000-05 9 p
Gotsman, Alexey
758 Logics and analyses for concurrent heap-manipulating programs Alexey Gotsman 2009-10 PhD
160 p
PDF (1.3 MB)
Grabczewski, Krzysztof
377 Mechanising set theory: cardinal arithmetic and the axiom of choice Larry Paulson, Krzysztof Grabczewski 1995-07 33 p PDF (0.3 MB)
PS (0.1 MB)
Graham, Brian
349 A HOL interpretation of Noden Brian Graham 1994-09 78 p
Granger, Tim
575 Reconfigurable wavelength-switched optical networks for the Internet core Tim Granger 2003-11 PhD
184 p
colour
PDF (2.5 MB)
Grant, Alasdair
500 The memorability and security of passwords – some empirical results Jianxin Yan, Alan Blackwell, et al. 2000-09 13 p PDF (0.2 MB)
Grant, Calum
511 Software visualization in Prolog Calum Grant 1999-12 PhD
193 p
PDF (2.0 MB)
Gray, Kathryn E.
776 System tests from unit tests Kathryn E. Gray, Alan Mycroft 2010-03 27 p PDF (0.3 MB)
Gray, Mike
38 Views and imprecise information in databases Mike Gray PhD
119 p
Greaves, David J.
258 Private ATM networks David J. Greaves, Derek McAuley 1992-05 12 p
Greenhalgh, Adam
626 Landmark Guided Forwarding: A hybrid approach for Ad Hoc routing Meng How Lim, Adam Greenhalgh, et al. 2005-03 28 p PDF (0.4 MB)
629 Hybrid routing: A pragmatic approach to mitigating position uncertainty in geo-routing Meng How Lim, Adam Greenhalgh, et al. 2005-04 26 p PDF (0.4 MB)
Grover, Claire
127 A development environment for large natural language grammars John Carroll, Bran Boguraev, et al. 1988-02 44 p
162 The Alvey natural language tools grammar (2nd Release) Claire Grover, Ted Briscoe, et al. 1989-04 90 p
233 A development environment for large natural language grammars John Carroll, Ted Briscoe, Claire Grover 1991-07 65 p
284 The Alvey Natural Language Tools grammar (4th Release) Claire Grover, John Carroll, Ted Briscoe 1993-01 260 p
Grundland, Mark
649 The decolorize algorithm for contrast enhancing, color to grayscale conversion Mark Grundland, Neil A. Dodgson 2005-10 15 p
colour
PDF (12.2 MB)
Grundy, Jim
318 A method of program refinement Jim Grundy 1993-11 PhD
207 p
PS (0.3 MB)
Gudka, Khilan
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
Gunter, Carl
107 DI-domains as a model of polymorphism Thierry Coquand, Carl Gunter, Glynn Winskel 1987-05 19 p
116 Domain theoretic models of polymorphism Thierry Coquand, Carl Gunter, Glynn Winskel 1987-09 52 p
Guo, Qiang
881 Web data knowledge extraction Juan M. Tirado, Ovidiu Serban, et al. 2016-03 60 p PDF (0.7 MB)
Habouzit, Pierre
605 Acute: High-level programming language design for distributed computation : Design rationale and language definition Peter Sewell, James J. Leifer, et al. 2004-10 193 p PDF (1.2 MB)
Haddadi, Hamed
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
Haddadi, Hamed
725 Beyond node degree: evaluating AS topology models Hamed Haddadi, Damien Fay, et al. 2008-07 16 p PDF (1.0 MB)
729 Weighted spectral distribution Damien Fay, Hamed Haddadi, et al. 2008-09 13 p PDF (0.2 MB)
756 Analysis of the Internet’s structural evolution Hamed Haddadi, Damien Fay, et al. 2009-09 13 p PDF (0.3 MB)
837 Human-data interaction Hamed Haddadi, Richard Mortier, et al. 2013-06 9 p PDF (0.4 MB)
Hague, Rob
651 End-user programming in multiple languages Rob Hague 2005-10 PhD
122 p
PDF (3.1 MB)
Hailes, Stephen
555 BOURSE – Broadband Organisation of Unregulated Radio Systems through Economics Jon Crowcroft, Richard Gibbens, Stephen Hailes 2003-01 10 p PDF (0.2 MB)
Hale, Roger William Stephen
173 Programming in temporal logic Roger William Stephen Hale 1989-07 PhD
182 p
Hall, A. Daniel
892 Pipelined image processing for pattern recognition A. Daniel Hall 2016-07 PhD
121 p
PDF (8.7 MB)
Hall, James
571 Multi-layer network monitoring and analysis James Hall 2003-07 PhD
230 p
colour
PDF (2.8 MB)
Halls, David A.
439 Applying mobile code to distributed systems David A. Halls 1997-12 PhD
158 p
Hamilton, Kenneth Graham
70 A remote procedure call system Kenneth Graham Hamilton PhD
109 p
Hamilton, K.G.
76 Preserving abstraction in concurrent programming R.C.B. Cooper, K.G. Hamilton 16 p
117 Distributed computing with RPC: the Cambridge approach J.M. Bacon, K.G. Hamilton 1987-10 15 p PDF (1.0 MB)
Hancke, Gerhard P.
752 Security of proximity identification systems Gerhard P. Hancke 2009-07 PhD
161 p
PDF (5.8 MB)
Hand, Steven M.
552 The Xenoserver computing infrastructure Keir A. Fraser, Steven M. Hand, et al. 2003-01 11 p PDF (0.2 MB)
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
596 Reconstructing I/O Keir Fraser, Steven Hand, et al. 2004-08 16 p PDF (0.3 MB)
633 On deadlock, livelock, and forward progress Alex Ho, Steven Smith, Steven Hand 2005-05 8 p PDF (0.2 MB)
Hankin, Paul D.
429 Compilation and equivalence of imperative objects Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen 1997-06 64 p PS (0.2 MB)
DVI (0.1 MB)
457 A concurrent object calculus: reduction and typing Andrew D. Gordon, Paul D. Hankin 1999-02 63 p
Hao, Aimin
755 Skin-detached surface for interactive large mesh editing Yujian Gao, Aimin Hao, et al. 2009-09 18 p PDF (1.1 MB)
Hao, Feng
640 Combining cryptography with biometrics effectively Feng Hao, Ross Anderson, John Daugman 2005-07 17 p PDF (0.2 MB)
715 On using fuzzy data in security mechanisms Feng Hao 2008-04 PhD
69 p
PDF (1.6 MB)
Harbison, William S.
437 Trusting in computer systems William S. Harbison 1997-12 PhD
95 p
PDF (1.6 MB)
Harita, Bhaskar Ramanathan
217 Dynamic bandwidth management Bhaskar Ramanathan Harita PhD
160 p
Harrison, John Robert
408 Theorem proving with the real numbers John Robert Harrison 1996-11 PhD
147 p
PS (0.4 MB)
DVI (0.3 MB)
410 Proof style John Harrison 1997-01 22 p PS (0.1 MB)
DVI (0.0 MB)
428 Floating point verification in HOL Light: the exponential function John Harrison 1997-06 112 p PS (0.3 MB)
DVI (0.1 MB)
Harris, Timothy L.
525 Extensible virtual machines Timothy L. Harris 2001-12 PhD
209 p
PDF (0.8 MB)
552 The Xenoserver computing infrastructure Keir A. Fraser, Steven M. Hand, et al. 2003-01 11 p PDF (0.2 MB)
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
572 Design choices for language-based transactions Tim Harris 2003-08 7 p PDF (0.2 MB)
639 Non-blocking hashtables with open addressing Chris Purcell, Tim Harris 2005-09 23 p PDF (0.3 MB)
Harter, Andrew Charles
202 Three-dimensional integrated circuit layout Andrew Charles Harter 1990-08 PhD
179 p
Hasle, F.V.
137 Mass terms and plurals : From linguistic theory to natural language processing F.V. Hasle 1988-06 171 p
Hassan, Mohamed F.
520 Ternary and three-point univariate subdivision schemes Mohamed Hassan, Neil A. Dodgson 2001-09 8 p PDF (0.1 MB)
539 Towards a ternary interpolating subdivision scheme for the triangular mesh N.A. Dodgson, M.A. Sabin, et al. 2002-07 12 p PDF (0.2 MB)
599 Further analysis of ternary and 3-point univariate subdivision schemes Mohamed F. Hassan 2004-08 9 p PDF (0.3 MB)
Hawkins, Stuart Philip
207 Video replay in computer animation Stuart Philip Hawkins 1990-10 PhD
161 p
Hayman, Jonathan M.
782 Petri net semantics Jonathan M. Hayman 2010-06 PhD
252 p
PDF (2.1 MB)
Hay, Simon
805 A model personal energy meter Simon Hay 2011-09 PhD
207 p
PDF (24.6 MB)
Hayter, Mark David
219 Fairisle project working documents : Snapshot 1 Ian M. Leslie, Derek M. McAuley, et al. 1991-03 15 p
228 The desk area network Mark Hayter, Derek McAuley 1991-05 11 p PS (0.0 MB)
319 A workstation architecture to support multimedia Mark David Hayter 1993-11 PhD
99 p
PS (0.7 MB)
Hayton, Richard
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
399 OASIS : An open architecture for secure interworking services Richard Hayton 1996-06 PhD
102 p
PDF (0.9 MB)
Hazel, P.
5 Parrot – A replacement for TCAM P. Hazel, A.J.M. Stoneley 1976-04 25 p PDF (1.2 MB)
12 HASP “IBM 1130” multileaving remote job entry protocol with extensions as used on the University of Cambridge IBM 370/165 M.R.A. Oakley, P. Hazel 1979-09 28 p PDF (1.6 MB)
Hazel, Philip
13 Resource allocation and job scheduling Philip Hazel 41 p PDF (2.0 MB)
Henderson, Eric K.
779 A text representation language for contextual and distributional processing Eric K. Henderson 2010-04 PhD
207 p
PDF (2.6 MB)
Herbelot, Aurelie
795 Underspecified quantification Aurelie Herbelot 2011-02 PhD
163 p
PDF (1.1 MB)
Herbert, Andrew
387 Monitoring composite events in distributed systems Scarlet Schwiderski, Andrew Herbert, Ken Moody 1996-02 20 p
Herbert, J.
66 A formal hardware verification methodology and its application to a network interface chip M.J.C. Gordon, J. Herbert 35 p
Herbert, John
122 Temporal abstraction of digital designs John Herbert 1988-02 34 p
123 Case study of the Cambridge Fast Ring ECL chip using HOL John Herbert 1988-02 38 p
124 Formal verification of basic memory devices John Herbert 1988-02 46 p
199 The HOL verification of ELLA designs Richard Boulton, Mike Gordon, et al. 1990-08 22 p PS (0.1 MB)
Herley, Cormac
817 The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes Joseph Bonneau, Cormac Herley, et al. 2012-03 32 p PDF (0.5 MB)
Herlihy, Maurice
659 A safety proof of a lazy concurrent list-based set implementation Viktor Vafeiadis, Maurice Herlihy, et al. 2006-01 19 p PDF (0.2 MB)
759 Coarse-grained transactions (extended version) Eric Koskinen, Matthew Parkinson, Maurice Herlihy 2011-08 34 p PDF (0.6 MB)
Herman, Isak
855 Mephistophone Patrick K.A. Wollner, Isak Herman, et al. 2014-06 8 p PDF (1.1 MB)
Herzog, Jonathan
644 Robbing the bank with a theorem prover Paul Youn, Ben Adida, et al. 2005-08 26 p PDF (0.2 MB)
Hicks, Michael
568 Dynamic rebinding for marshalling and update, with destruct-time λ Gavin Bierman, Michael Hicks, et al. 2004-02 85 p PDF (0.7 MB)
Hild, Stefan G.
372 A brief history of mobile telephony Stefan G. Hild 1995-01 19 p PDF (1.6 MB)
Hilken, Barnaby P.
336 Towards a proof theory of rewriting: the simply-typed 2-λ calculus Barnaby P. Hilken 1994-05 28 p
Hinchey, Michael G.
350 Ten commandments of formal methods Jonathan P. Bowen, Michael G. Hinchey 1994-09 18 p
357 Seven more myths of formal methods Jonathan P. Bowen, Michael G. Hinchey 1994-12 12 p
Ho, Alex C.
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
633 On deadlock, livelock, and forward progress Alex Ho, Steven Smith, Steven Hand 2005-05 8 p PDF (0.2 MB)
Hoare, Tony
659 A safety proof of a lazy concurrent list-based set implementation Viktor Vafeiadis, Maurice Herlihy, et al. 2006-01 19 p PDF (0.2 MB)
Holden, Sean B.
804 The HasGP user manual Sean B. Holden 2011-09 18 p PDF (0.3 MB)
883 Survey propagation applied to weighted partial maximum satisfiability Richard Russell, Sean B. Holden 2016-03 15 p PDF (0.3 MB)
885 HasGP: A Haskell library for Gaussian process inference Sean B. Holden 2016-04 6 p PDF (0.1 MB)
Hollis, Simon J.
698 Pulse-based, on-chip interconnect Simon J. Hollis 2007-09 PhD
186 p
PDF (3.9 MB)
Hon, W. Kuan
863 Regional clouds: technical considerations Jatinder Singh, Jean Bacon, et al. 2014-11 18 p PDF (0.6 MB)
Hopper, Andrew
7 Local area computer communication networks Andrew Hopper 1978-04 PhD
192 p
PDF (1.9 MB)
90 The Cambridge Fast Ring networking system (CFR) Andy Hopper, Roger M. Needham 1986-06 25 p PDF (0.6 MB)
859 Resourceful: fine-grained resource accounting for explaining service variability Lucian Carata, Oliver Chick, et al. 2014-09 12 p PDF (0.4 MB)
888 Recomputation-based data reliability for MapReduce using lineage Sherif Akoush, Ripduman Sohan, Andy Hopper 2016-05 19 p PDF (0.5 MB)
889 Evaluating the viability of remote renewable energy in datacentre computing Sherif Akoush, Ripduman Sohan, et al. 2016-05 26 p PDF (0.6 MB)
Horvat, Matic
913 Hierarchical statistical semantic translation and realization Matic Horvat 2017-10 PhD
215 p
PDF (5.8 MB)
Houghton, Michelle
922 Raising a new generation of cyber defenders Frank Stajano, Graham Rymer, Michelle Houghton 2018-06 307 p PDF (68.6 MB)
Howard, Heidi
857 ARC: Analysis of Raft Consensus Heidi Howard 2014-07 BA
69 p
PDF (1.2 MB)
Huang, Feng
375 Restructuring virtual memory to support distributed computing environments Feng Huang 1995-07 PhD
135 p
Huang, Zongyan
884 Machine learning and computer algebra Zongyan Huang 2016-04 PhD
113 p
PDF (1.5 MB)
Hui, Pan
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
Hui, Pan
617 Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding Augustin Chaintreau, Pan Hui, et al. 2005-02 26 p PDF (0.8 MB)
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
684 Bubble Rap: Forwarding in small world DTNs in ever decreasing circles Pan Hui, Jon Crowcroft 2007-05 44 p PDF (1.0 MB)
713 People are the network: experimental design and evaluation of social-based forwarding algorithms Pan Hui 2008-03 PhD
160 p
PDF (4.6 MB)
749 Identifying social communities in complex communications for network efficiency Pan Hui, Eiko Yoneki, et al. 2009-05 14 p PDF (0.7 MB)
Hultén, Maj
464 Feature representation for the automatic analysis of fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 36 p
465 Gelfish – graphical environment for labelling FISH images Boaz Lerner, Seema Dhanjal, Maj Hultén 1999-05 20 p
466 Automatic signal classification in fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 24 p
Humphrys, Mark
362 W-learning: competition among selfish Q-learners Mark Humphrys 1995-04 30 p PS (0.1 MB)
426 Action selection methods using reinforcement learning Mark Humphrys 1997-06 PhD
195 p
PS (0.5 MB)
Hunter, Jane Louise
348 Integrated sound synchronisation for computer animation Jane Louise Hunter 1994-08 PhD
248 p
Hunter, Paul William
704 Complexity and infinite games on finite graphs Paul William Hunter 2007-11 PhD
170 p
PDF (1.5 MB)
Hurd, Joe
461 Integrating Gandalf and HOL Joe Hurd 1999-03 11 p PDF (0.2 MB)
566 Formal verification of probabilistic algorithms Joe Hurd 2003-05 PhD
154 p
PDF (0.9 MB)
567 Using inequalities as term ordering constraints Joe Hurd 2003-06 17 p PDF (0.3 MB)
Hu, Wenjun
631 MIRRORS: An integrated framework for capturing real world behaviour for models of ad hoc networks Wenjun Hu, Jon Crowcroft 2005-04 16 p PDF (0.5 MB)
Hyden, Eoin Andrew
340 Operating system support for quality of service Eoin Andrew Hyden 1994-06 PhD
102 p
PDF (1.1 MB)
Hyland, Martin
535 Designs, disputes and strategies Claudia Faggian, Martin Hyland 2002-05 21 p PDF (0.3 MB)
Impett, Leonardo
855 Mephistophone Patrick K.A. Wollner, Isak Herman, et al. 2014-06 8 p PDF (1.1 MB)
Ingram, David
501 Integrated quality of service management David Ingram 2000-09 PhD
90 p
Ingulfsen, Tommy
610 Influence of syntax on prosodic boundary prediction Tommy Ingulfsen 2004-12 MPhil
49 p
PDF (0.4 MB)
Iosif, Adona
768 Report on existing open-source electronic medical records Cecily Morrison, Adona Iosif, Miklos Danka 2010-02 12 p
colour
PDF (1.1 MB)
Isaacs, Rebecca
510 Switchlets and resource-assured MPLS networks Richard Mortier, Rebecca Isaacs, Keir Fraser 2000-05 16 p PDF (0.1 MB)
PS (0.1 MB)
516 Dynamic provisioning of resource-assured and programmable virtual private networks Rebecca Isaacs 2001-09 PhD
145 p
PS (0.5 MB)
Ivrissimtzis, I.P.
542 A generative classification of mesh refinement rules with lattice transformations I.P. Ivrissimtzis, N.A. Dodgson, M.A. Sabin 2002-09 13 p PDF (0.2 MB)
544 On the support of recursive subdivision I.P. Ivrissimtzis, M.A. Sabin, N.A. Dodgson 2002-09 20 p PDF (4.0 MB)
Iyoda, Juliano
682 Translating HOL functions to hardware Juliano Iyoda 2007-04 PhD
89 p
PDF (0.7 MB)
Jagannathan, Suresh
808 Resource-sensitive synchronisation inference by abduction Matko Botinčan, Mike Dodds, Suresh Jagannathan 2012-01 57 p PDF (0.6 MB)
Jamakovic, Almerima
725 Beyond node degree: evaluating AS topology models Hamed Haddadi, Damien Fay, et al. 2008-07 16 p PDF (1.0 MB)
729 Weighted spectral distribution Damien Fay, Hamed Haddadi, et al. 2008-09 13 p PDF (0.2 MB)
756 Analysis of the Internet’s structural evolution Hamed Haddadi, Damien Fay, et al. 2009-09 13 p PDF (0.3 MB)
Jardetzky, Paul W.
268 Network file server design for continuous media Paul W. Jardetzky 1992-10 PhD
101 p
PS (0.3 MB)
Jardine, James G.
848 Automatically generating reading lists James G. Jardine 2014-02 PhD
164 p
PDF (6.4 MB)
Jenkinson, Graeme
924 OpenDTrace Specification version 1.0 George Neville-Neil, Jonathan Anderson, et al. 2018-08 235 p PDF (0.9 MB)
Jensen, Ole Høgh
570 Bigraphs and mobile processes Ole Høgh Jensen, Robin Milner 2003-07 121 p PDF (0.9 MB)
580 Bigraphs and mobile processes (revised) Ole Høgh Jensen, Robin Milner 2004-02 131 p PDF (1.0 MB)
Jiang, Xiaofeng
251 Multipoint digital video communication Xiaofeng Jiang 1992-04 PhD
124 p
Joannou, Alexandre
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
Johnson, Martyn Alan
27 Exception handling in domain based systems Martyn Alan Johnson PhD
129 p
Johnson, Matthew
731 A new approach to Internet banking Matthew Johnson 2008-09 PhD
113 p
PDF (1.3 MB)
Johnson, Neil E.
529 The triVM intermediate language reference manual Neil Johnson 2002-02 83 p PDF (0.4 MB)
607 Code size optimization for embedded processors Neil E. Johnson 2004-11 PhD
159 p
PDF (1.0 MB)
Johnson, S.E.
517 The Cambridge Multimedia Document Retrieval Project: summary of experiments Karen Spärck Jones, P. Jourlin, et al. 2001-07 30 p PS (0.1 MB)
DVI (0.0 MB)
Jones, G.J.F.
335 Video mail retrieval using voice: report on keyword definition and data collection (deliverable report on VMR task No. 1) G.J.F. Jones, J.T. Foote, et al. 1994-04 38 p PDF (1.7 MB)
366 Retrieving spoken documents: VMR Project experiments K. Spärck Jones, G.J.F. Jones, et al. 1995-05 28 p
402 Video mail retrieval using voice: report on collection of naturalistic requests and relevance assessments G.J.F. Jones, J.T. Foote, et al. 1996-09 21 p
430 Video mail retrieval using voice : Report on topic spotting G.J.F. Jones, J.T. Foote, et al. 1997-07 73 p
Jourlin, P.
517 The Cambridge Multimedia Document Retrieval Project: summary of experiments Karen Spärck Jones, P. Jourlin, et al. 2001-07 30 p PS (0.1 MB)
DVI (0.0 MB)
Joyce, Jeffrey J.
100 Proving a computer correct in higher order logic Jeff Joyce, Graham Birtwistle, Mike Gordon 1986-12 57 p
109 Hardware verification of VLSI regular structures Jeffrey Joyce 1987-07 20 p
136 Formal specification and verification of asynchronous processes in higher-order logic Jeffrey J. Joyce 1988-06 45 p PDF (2.3 MB)
147 Formal specification and verification of microprocessor systems Jeffrey Joyce 1988-09 24 p
167 A verified compiler for a verified microprocessor Jeffrey J. Joyce 1989-03 67 p
178 Totally verified systems: linking verified software to verified hardware Jeffrey J. Joyce 1989-09 25 p PDF (1.5 MB)
195 Multi-level verification of microprocessor-based systems Jeffrey J. Joyce 1990-05 PhD
163 p
Kahn, Gilles
313 Proof by pointing Yves Bertot, Gilles Kahn, Laurent Théry 1993-10 27 p
Kalyvianaki, Evangelia
762 Resource provisioning for virtualized server applications Evangelia Kalyvianaki 2009-11 PhD
161 p
PDF (2.0 MB)
Kammüller, Florian
449 Locales : A sectioning concept for Isabelle Florian Kammüller, Markus Wenzel 1998-10 16 p
452 A formal proof of Sylow’s theorem : An experiment in abstract algebra with Isabelle Hol Florian Kammüller, Lawrence C. Paulson 1998-11 30 p PDF (0.2 MB)
470 Modular reasoning in Isabelle Florian Kammüller 1999-08 PhD
128 p
Karger, Paul Ashley
149 Improving security and performance of capability systems Paul Ashley Karger 1988-10 PhD
273 p
PS (0.5 MB)
Katsiri, Eleftheria
620 Middleware support for context-awareness in distributed sensor-driven systems Eleftheria Katsiri 2005-02 PhD
176 p
PDF (1.9 MB)
Kell, Stephen
845 Black-box composition of mismatched software components Stephen Kell 2013-12 PhD
251 p
PDF (2.8 MB)
Kelly, Colin
839 Automatic extraction of property norm-like data from large text corpora Colin Kelly 2013-09 PhD
154 p
PDF (1.0 MB)
Kennedy, Andrew
303 Drawing trees — a case study in functional programming Andrew Kennedy 1993-06 9 p
Kennedy, Andrew John
391 Programming languages and dimensions Andrew John Kennedy 1996-04 PhD
149 p
PDF (0.9 MB)
Khattak, Sheharbano
897 Characterization of Internet censorship from multiple perspectives Sheharbano Khattak 2017-01 PhD
170 p
PDF (3.6 MB)
Khoo, Wei Ming
844 Decompilation as search Wei Ming Khoo 2013-11 PhD
119 p
PDF (1.2 MB)
Khorsheed, Mohammad S.M.
495 Automatic recognition of words in Arabic manuscripts Mohammad S.M. Khorsheed 2000-07 PhD
242 p
PDF (2.4 MB)
Kidney, Brian
924 OpenDTrace Specification version 1.0 George Neville-Neil, Jonathan Anderson, et al. 2018-08 235 p PDF (0.9 MB)
Kiela, Douwe
899 Deep embodiment: grounding semantics in perceptual modalities Douwe Kiela 2017-02 PhD
128 p
PDF (5.8 MB)
Klein, Carole Susan
216 Exploiting OR-parallelism in Prolog using multiple sequential machines Carole Susan Klein PhD
250 p
266 Automatic exploitation of OR-parallelism in Prolog Carole Klein 18 p
Kleppmann, Martin
683 Simulation of colliding constrained rigid bodies Martin Kleppmann 2007-04 65 p PDF (6.9 MB)
Knell, John
760 Radical innovation: crossing knowledge boundaries with interdisciplinary teams Alan F. Blackwell, Lee Wilson, et al. 2009-11 124 p PDF (0.7 MB)
Knight, Brian James
26 Portable system software for personal computers on a network Brian James Knight PhD
204 p
Kochmar, Ekaterina
886 Error detection in content word combinations Ekaterina Kochmar 2016-05 PhD
170 p
PDF (3.8 MB)
Komnios, Ioannis
841 Information centric delay tolerant networking: an internet architecture for the challenged Arjuna Sathiaseelan, Dirk Trossen, et al. 2013-09 11 p PDF (0.2 MB)
Korhonen, Anna
491 Is hypothesis testing useful for subcategorization acquisition? Anna Korhonen, Genevive Gorrell, Diana McCarthy 2000-05 9 p
530 Subcategorization acquisition Anna Korhonen 2002-02 PhD
189 p
PDF (1.1 MB)
Koskinen, Eric
759 Coarse-grained transactions (extended version) Eric Koskinen, Matthew Parkinson, Maurice Herlihy 2011-08 34 p PDF (0.6 MB)
788 Branching-time reasoning for programs (extended version) Byron Cook, Eric Koskinen, Moshe Vardi 2011-07 38 p PDF (0.9 MB)
789 Making prophecies with decision predicates Byron Cook, Eric Koskinen 2010-11 29 p PDF (0.6 MB)
Koszek, Wojciech
851 Capability Hardware Enhanced RISC Instructions: CHERI User’s guide Robert N.M. Watson, David Chisnall, et al. 2014-04 26 p PDF (0.4 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
853 Bluespec Extensible RISC Implementation: BERI Software reference Robert N.M. Watson, David Chisnall, et al. 2014-04 34 p PDF (0.9 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
869 Bluespec Extensible RISC Implementation: BERI Software reference Robert N. M. Watson, David Chisnall, et al. 2015-04 27 p PDF (0.9 MB)
877 Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide Robert N. M. Watson, David Chisnall, et al. 2015-09 58 p PDF (0.4 MB)
Kotsovinos, Evangelos
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
615 Global public computing Evangelos Kotsovinos 2005-01 PhD
229 p
PDF (1.8 MB)
Kreibich, Christian
703 Lazy Susan: dumb waiting as proof of work Jon Crowcroft, Tim Deegan, et al. 2007-11 23 p PDF (0.3 MB)
Kuhn, Markus G.
577 Compromising emanations: eavesdropping risks of computer displays Markus G. Kuhn 2003-12 PhD
167 p
PDF (8.4 MB)
Kumar, Abhishek
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
Kumar, Akhil
331 HPP: a hierarchical propagation protocol for large scale replication in wide area networks Noha Adly, Akhil Kumar 1994-03 24 p
Kumar, Ramana
879 Self-compilation and self-verification Ramana Kumar 2016-02 PhD
148 p
PDF (0.9 MB)
Kunegis, Jérôme
806 On joint diagonalisation for dynamic network analysis Damien Fay, Jérôme Kunegis, Eiko Yoneki 2011-10 12 p PDF (0.8 MB)
Kwong, Oi Yee
504 Word sense selection in texts: an integrated model Oi Yee Kwong 2000-09 PhD
177 p
PS (0.6 MB)
Lakin, Matthew R.
772 An executable meta-language for inductive definitions with binders Matthew R. Lakin 2010-03 PhD
171 p
PDF (1.1 MB)
Lam, Kwok-yan
226 A new approach for improving system availability Kwok-yan Lam 1991-06 PhD
108 p
Lamport, Leslie
425 Should your specification language be typed? Leslie Lamport, Lawrence C. Paulson 1997-05 30 p PDF (0.3 MB)
Lang, Ulrich
564 Access policies for middleware Ulrich Lang 2003-05 PhD
138 p
PDF (0.8 MB)
Larmouth, J.
2 Scheduling for a share of the machine J. Larmouth 1974-10 29 p PDF (1.4 MB)
Larsen, Ken Friis
481 Combining the Hol98 proof assistant with the BuDDy BDD package Mike Gordon, Ken Friis Larsen 1999-12 71 p
Larsen, Kim Guldstrand
51 Using information systems to solve recursive domain equations effectively Glynn Winskel, Kim Guldstrand Larsen 1984-07 41 p PDF (2.9 MB)
Lassen, Søren B.
429 Compilation and equivalence of imperative objects Andrew D. Gordon, Paul D. Hankin, Søren B. Lassen 1997-06 64 p PS (0.2 MB)
DVI (0.1 MB)
Laurie, Ben
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
Lawrence, Alan C.
705 Optimizing compilation with the Value State Dependence Graph Alan C. Lawrence 2007-12 PhD
183 p
colour
PDF (3.8 MB)
Lawrence, Neil D.
475 A comparison of state-of-the-art classification techniques with application to cytogenetics Boaz Lerner, Neil D. Lawrence 1999-10 34 p
Lee, Jong-Hyeon
489 Designing a reliable publishing framework Jong-Hyeon Lee 2000-04 PhD
129 p
PDF (0.9 MB)
Lee, Kang-Won
708 IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks Chi-Kin Chau, Jon Crowcroft, et al. 2008-01 24 p PDF (0.3 MB)
Leeser, Miriam Ellen
126 Reasoning about the function and timing of integrated circuits with Prolog and temporal logic M.E. Leeser 1988-02 50 p
132 Reasoning about the function and timing of integrated circuits with Prolog and temporal logic Miriam Ellen Leeser 1988-04 PhD
151 p
Leifer, James J.
496 Contexts and embeddings for closed shallow action graphs Gian Luca Cattani, James J. Leifer, Robin Milner 2000-07 56 p PS (0.2 MB)
508 Shallow linear action graphs and their embeddings James Leifer, Robin Milner 2000-10 16 p PS (0.1 MB)
521 Operational congruences for reactive systems James Leifer 2001-09 PhD
144 p
PS (0.9 MB)
569 Global abstraction-safe marshalling with hash types James J. Leifer, Gilles Peskine, et al. 2003-06 86 p PDF (0.8 MB)
598 Transition systems, link graphs and Petri nets James J. Leifer, Robin Milner 2004-08 64 p PDF (0.6 MB)
605 Acute: High-level programming language design for distributed computation : Design rationale and language definition Peter Sewell, James J. Leifer, et al. 2004-10 193 p PDF (1.2 MB)
Leonard, Timothy E.
188 Specification of computer architectures: a survey and annotated bibliography Timothy E. Leonard 1990-01 42 p
Lepler, Jörg H.
622 Cooperation and deviation in market-based resource allocation Jörg H. Lepler 2005-03 PhD
173 p
PDF (2.3 MB)
Lerner, Boaz
464 Feature representation for the automatic analysis of fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 36 p
465 Gelfish – graphical environment for labelling FISH images Boaz Lerner, Seema Dhanjal, Maj Hultén 1999-05 20 p
466 Automatic signal classification in fluorescence in-situ hybridization images Boaz Lerner, William Clocksin, et al. 1999-05 24 p
474 A Bayesian methodology and probability density estimation for fluorescence in-situ hybridization signal classification Boaz Lerner 1999-10 31 p
475 A comparison of state-of-the-art classification techniques with application to cytogenetics Boaz Lerner, Neil D. Lawrence 1999-10 34 p
Leslie, Ian Malcom
43 Extending the local area network Ian Malcom Leslie 1983-02 PhD
71 p
PDF (2.9 MB)
168 Distributed computing with a processor bank J.M. Bacon, I.M. Leslie, R.M. Needham 1989-04 15 p PDF (0.6 MB)
219 Fairisle project working documents : Snapshot 1 Ian M. Leslie, Derek M. McAuley, et al. 1991-03 15 p
281 Pegasus project description Sape J. Mullender, Ian M. Leslie, Derek McAuley 1992-09 23 p
282 Pegasus – Operating system support for distributed multimedia systems Ian M. Leslie, Derek McAuley, Sape J. Mullender 1992-12 14 p
552 The Xenoserver computing infrastructure Keir A. Fraser, Steven M. Hand, et al. 2003-01 11 p PDF (0.2 MB)
Leung, Ian X. Y.
767 Ising model of rumour spreading in interacting communities Massimo Ostilli, Eiko Yoneki, et al. 2010-01 24 p PDF (3.2 MB)
Levine, John M.
182 The theory and implementation of a bidirectional question answering system John M. Levine, Lee Fedder 1989-10 27 p
Lewis, Andrew B.
813 Reconstructing compressed photo and video data Andrew B. Lewis 2012-02 PhD
148 p
colour
PDF (3.5 MB)
Lewis, David D.
307 Natural language processing for information retrieval David D. Lewis, Karen Spärck Jones 1993-07 22 p PS (0.1 MB)
Lieng, Henrik
862 Surface modelling for 2D imagery Henrik Lieng 2014-10 PhD
177 p
colour
PDF (22.3 MB)
Li, Guangxing
322 Supporting distributed realtime computing Guangxing Li 1993-12 PhD
113 p
Li, Huiyun
665 Security evaluation at design time for cryptographic hardware Huiyun Li 2006-04 PhD
81 p
PDF (1.9 MB)
Lim, Meng How
626 Landmark Guided Forwarding: A hybrid approach for Ad Hoc routing Meng How Lim, Adam Greenhalgh, et al. 2005-03 28 p PDF (0.4 MB)
629 Hybrid routing: A pragmatic approach to mitigating position uncertainty in geo-routing Meng How Lim, Adam Greenhalgh, et al. 2005-04 26 p PDF (0.4 MB)
674 Landmark Guided Forwarding Meng How Lim 2006-10 PhD
109 p
PDF (0.9 MB)
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
Lin, Amerson
644 Robbing the bank with a theorem prover Paul Youn, Ben Adida, et al. 2005-08 26 p PDF (0.2 MB)
Lió, Pietro
767 Ising model of rumour spreading in interacting communities Massimo Ostilli, Eiko Yoneki, et al. 2010-01 24 p PDF (3.2 MB)
Liu, Ruoshui
727 A novel auto-calibration system for wireless sensor motes Ruoshui Liu, Ian J. Wassell 2008-09 65 p PDF (5.5 MB)
Li, Wei
748 GTVS: boosting the collection of application traffic ground truth Marco Canini, Wei Li, Andrew W. Moore 2009-04 20 p PDF (0.3 MB)
750 AtoZ: an automatic traffic organizer using NetFPGA Marco Canini, Wei Li, et al. 2009-05 27 p PDF (0.8 MB)
Loesch, Steffen
860 Program equivalence in functional metaprogramming via nominal Scott domains Steffen Loesch 2014-10 PhD
164 p
PDF (1.5 MB)
Logan, Brian
339 Belief revision and dialogue management in information retrieval Brian Logan, Steven Reece, et al. 1994-05 227 p PDF (13.3 MB)
Lo, Sai-Lai
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
295 OPERA : Storage and presentation support for multimedia applications in a distributed, ATM network environment Jean Bacon, John Bates, et al. 1993-04 12 p
326 A modular and extensible network storage architecture Sai-Lai Lo 1994-01 PhD
147 p
PS (0.3 MB)
Luff, Meredydd
831 Communication for programmability and performance on multi-core processors Meredydd Luff 2013-04 PhD
89 p
PDF (1.3 MB)
MacDorman, Karl F.
423 Symbol grounding : Learning categorical and sensorimotor predictions for coordination in autonomous robots Karl F. MacDorman 1997-05 PhD
170 p
Ma, Chaoying
270 Designing a universal name service Chaoying Ma PhD
133 p
PDF (6.8 MB)
Macías, Benjamín
373 Natural-language processing and requirements specifications Benjamín Macías, Stephen G. Pulman 1995-07 73 p
Madhavapeddy, Anil V.S.
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
609 Using camera-phones to interact with context-aware mobile services Eleanor Toye, Anil Madhavapeddy, et al. 2004-12 23 p PDF (0.4 MB)
775 Creating high-performance, statically type-safe network applications Anil Madhavapeddy 2010-03 PhD
169 p
PDF (2.0 MB)
863 Regional clouds: technical considerations Jatinder Singh, Jean Bacon, et al. 2014-11 18 p PDF (0.6 MB)
Maennel, Olaf
725 Beyond node degree: evaluating AS topology models Hamed Haddadi, Damien Fay, et al. 2008-07 16 p PDF (1.0 MB)
Mahmoud, Ola
807 Second-order algebraic theories Ola Mahmoud 2011-10 PhD
133 p
PDF (0.9 MB)
Mak, Jonathan
796 Facilitating program parallelisation: a profiling-based approach Jonathan Mak 2011-03 PhD
120 p
PDF (1.2 MB)
Mansley, Kieran
784 Characterizing 10 Gbps network interface energy consumption Ripduman Sohan, Andrew Rice, et al. 2010-07 10 p PDF (0.2 MB)
Manson, Paul R.
139 Petri net theory: a survey Paul R. Manson 1988-06 77 p PDF (3.3 MB)
Mapp, Glenford Ezra
242 An object oriented approach to virtual memory management Glenford Ezra Mapp 1992-01 PhD
150 p
PDF (6.6 MB)
Marinos, Ilias
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
Markettos, A. Theodore
811 Active electromagnetic attacks on secure hardware A. Theodore Markettos 2011-12 PhD
217 p
colour
PDF (10.6 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
Martina, Jean E.
816 Verification of security protocols based on multicast communication Jean E. Martina 2012-03 PhD
150 p
PDF (1.1 MB)
Martin, Ursula
170 Ordered rewriting and confluence Ursula Martin, Tobias Nipkow 1989-05 18 p
179 Automating Squiggol Ursula Martin, Tobias Nipkow 1989-09 16 p
Massacci, Fabio
424 Simplification with renaming: a general proof technique for tableau and sequent-based provers Fabio Massacci 1997-05 26 p DVI (0.0 MB)
488 Formal verification of card-holder registration in SET Giampaolo Bella, Fabio Massacci, et al. 2000-03 15 p
524 Verifying the SET purchase protocols Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson 2001-11 14 p PDF (0.2 MB)
531 Verifying the SET registration protocols Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson 2002-03 24 p PDF (0.4 MB)
Matooane, Mantsika
537 Parallel systems in symbolic and algebraic computation Mantsika Matooane 2002-06 PhD
139 p
PDF (0.8 MB)
Matthews, David Charles James
49 Programming language design with polymorphism David Charles James Matthews PhD
143 p
Matthews, David C.J.
63 Poly manual David C.J. Matthews 1985-02 46 p PDF (1.4 MB)
99 An overview of the Poly programming language David C.J. Matthews 1986-08 11 p
102 A persistent storage system for Poly and ML David C.J. Matthews 1987-01 16 p
Matthews, D.C.J.
28 Poly report D.C.J. Matthews 1982-08 17 p PDF (0.8 MB)
29 Introduction to Poly D.C.J. Matthews 1982-05 24 p PDF (1.0 MB)
161 Papers on Poly/ML D.C.J. Matthews 1989-02 150 p
Maybury, Mark Thomas
239 Planning multisentential English text using communicative acts Mark Thomas Maybury 1991-12 PhD
329 p
PDF (26.8 MB)
McAuley, Derek Robert
186 Protocol design for high speed networks Derek Robert McAuley 1990-01 PhD
100 p
PS (0.3 MB)
219 Fairisle project working documents : Snapshot 1 Ian M. Leslie, Derek M. McAuley, et al. 1991-03 15 p
228 The desk area network Mark Hayter, Derek McAuley 1991-05 11 p PS (0.0 MB)
258 Private ATM networks David J. Greaves, Derek McAuley 1992-05 12 p
281 Pegasus project description Sape J. Mullender, Ian M. Leslie, Derek McAuley 1992-09 23 p
282 Pegasus – Operating system support for distributed multimedia systems Ian M. Leslie, Derek McAuley, Sape J. Mullender 1992-12 14 p
837 Human-data interaction Hamed Haddadi, Richard Mortier, et al. 2013-06 9 p PDF (0.4 MB)
McCarthy, Diana
491 Is hypothesis testing useful for subcategorization acquisition? Anna Korhonen, Genevive Gorrell, Diana McCarthy 2000-05 9 p
Medlock, Ben W.
721 Investigating classification for natural language processing tasks Ben W. Medlock 2008-06 PhD
138 p
PDF (1.4 MB)
790 Automated assessment of ESOL free text examinations Ted Briscoe, Ben Medlock, Øistein Andersen 2010-11 31 p PDF (0.5 MB)
Mehmood, Rashid
650 Parallel iterative solution method for large sparse linear equation systems Rashid Mehmood, Jon Crowcroft 2005-10 22 p PDF (1.9 MB)
Melham, Thomas Frederick
91 Hardware verification using higher-order logic Albert Camilleri, Mike Gordon, Tom Melham 1986-09 25 p PDF (1.3 MB)
106 Abstraction mechanisms for hardware verification Thomas F. Melham 1987-05 23 p
135 Using reclusive types to reason about hardware in higher order logic Thomas F. Melham 1988-05 30 p
146 Automating recursive type definitions in higher order logic Thomas F. Melham 1988-09 64 p
201 Formalizing abstraction mechanisms for hardware verification in higher order logic Thomas Frederick Melham 1990-08 PhD
233 p
PDF (1.7 MB)
244 A mechanized theory of the π-calculus in HOL T.F. Melham 31 p
265 Reasoning with inductively defined relations in the HOL theorem prover Juanito Camilleri, Tom Melham 1992-08 49 p
Menage, Paul B.
561 Resource control of untrusted code in an open network environment Paul B. Menage 2003-03 PhD
185 p
colour
PDF (1.1 MB)
Mendes, Jose F. F.
767 Ising model of rumour spreading in interacting communities Massimo Ostilli, Eiko Yoneki, et al. 2010-01 24 p PDF (3.2 MB)
Meng, Jia
872 The integration of higher order interactive proof with first order automatic theorem proving Jia Meng 2015-07 PhD
144 p
PDF (1.0 MB)
Message, Robin
843 Programming for humans: a new paradigm for domain-specific languages Robin Message 2013-11 PhD
140 p
PDF (1.6 MB)
Michael, Ang Kun Joo
912 Network traffic classification via neural networks Ang Kun Joo Michael, Emma Valla, et al. 2017-09 25 p to appear
Millard, Christopher
863 Regional clouds: technical considerations Jatinder Singh, Jean Bacon, et al. 2014-11 18 p PDF (0.6 MB)
Miller, John L.
753 Carbon: trusted auditing for P2P distributed virtual environments John L. Miller, Jon Crowcroft 2009-08 20 p PDF (0.8 MB)
809 Distributed virtual environment scalability and security John L. Miller 2011-10 PhD
98 p
PDF (1.9 MB)
Milne, Robert
221 Transforming axioms for data types into sequential programs Robert Milne 44 p PDF (2.2 MB)
Milner, Robin
20 On using Edinburgh LCF to prove the correctness of a parsing algorithm Avra Cohn, Robin Milner 1982-02 23 p PDF (1.2 MB)
496 Contexts and embeddings for closed shallow action graphs Gian Luca Cattani, James J. Leifer, Robin Milner 2000-07 56 p PS (0.2 MB)
508 Shallow linear action graphs and their embeddings James Leifer, Robin Milner 2000-10 16 p PS (0.1 MB)
523 Bigraphical reactive systems: basic theory Robin Milner 2001-09 87 p PDF (1.7 MB)
570 Bigraphs and mobile processes Ole Høgh Jensen, Robin Milner 2003-07 121 p PDF (0.9 MB)
580 Bigraphs and mobile processes (revised) Ole Høgh Jensen, Robin Milner 2004-02 131 p PDF (1.0 MB)
581 Axioms for bigraphical structure Robin Milner 2004-02 26 p PDF (0.3 MB)
598 Transition systems, link graphs and Petri nets James J. Leifer, Robin Milner 2004-08 64 p PDF (0.6 MB)
603 Bigraphs whose names have multiple locality Robin Milner 2004-09 15 p PDF (0.2 MB)
614 Pure bigraphs Robin Milner 2005-01 66 p PDF (0.6 MB)
Milway, David Russel
101 Binary routing networks David Russel Milway 1986-12 PhD
131 p
Moenning, Carsten
562 Fast Marching farthest point sampling Carsten Moenning, Neil A. Dodgson 2003-04 16 p PDF (0.5 MB)
565 Fast Marching farthest point sampling for point clouds and implicit surfaces Carsten Moenning, Neil A. Dodgson 2003-05 15 p PDF (0.5 MB)
658 Intrinsic point-based surface processing Carsten Moenning 2006-01 PhD
166 p
PDF (8.1 MB)
Moffat, D.C.
154 A natural language interface to an intelligent planning system I.B. Crabtree, R.S. Crouch, et al. 1989-01 14 p
Moncaster, Toby
921 Optimising data centre operation by removing the transport bottleneck Toby Moncaster 2018-06 PhD
130 p
PDF (8.0 MB)
Moody, Ken
293 Objects and transactions for modelling distributed applications: concurrency control and commitment Jean Bacon, Ken Moody 1993-04 39 p
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
295 OPERA : Storage and presentation support for multimedia applications in a distributed, ATM network environment Jean Bacon, John Bates, et al. 1993-04 12 p
296 A persistent programming language for multimedia databases in the OPERA project Z. Wu, K. Moody, J. Bacon 1993-04 9 p
301 The dual-level validation concurrency control method Zhixue Wu, Ken Moody, Jean Bacon 1993-06 24 p
387 Monitoring composite events in distributed systems Scarlet Schwiderski, Andrew Herbert, Ken Moody 1996-02 20 p
Moore, Andrew William
209 Efficient memory-based learning for robot control Andrew William Moore 1990-11 PhD
248 p
PDF (11.3 MB)
Moore, Andrew William
528 Measurement-based management of network resources Andrew William Moore 2002-04 PhD
273 p
PDF (1.7 MB)
725 Beyond node degree: evaluating AS topology models Hamed Haddadi, Damien Fay, et al. 2008-07 16 p PDF (1.0 MB)
729 Weighted spectral distribution Damien Fay, Hamed Haddadi, et al. 2008-09 13 p PDF (0.2 MB)
748 GTVS: boosting the collection of application traffic ground truth Marco Canini, Wei Li, Andrew W. Moore 2009-04 20 p PDF (0.3 MB)
750 AtoZ: an automatic traffic organizer using NetFPGA Marco Canini, Wei Li, et al. 2009-05 27 p PDF (0.8 MB)
756 Analysis of the Internet’s structural evolution Hamed Haddadi, Damien Fay, et al. 2009-09 13 p PDF (0.3 MB)
784 Characterizing 10 Gbps network interface energy consumption Ripduman Sohan, Andrew Rice, et al. 2010-07 10 p PDF (0.2 MB)
912 Network traffic classification via neural networks Ang Kun Joo Michael, Emma Valla, et al. 2017-09 25 p to appear
914 Characterizing the impact of network latency on cloud-based applications’ performance Diana Andreea Popescu, Noa Zilberman, Andrew W. Moore 2017-11 20 p PDF (0.8 MB)
Moore, J.R.
398 Design and implementation of an autostereoscopic camera system N.A. Dodgson, J.R. Moore 1996-06 20 p PDF (0.3 MB)
540 The use of computer graphics rendering software in the analysis of a novel autostereoscopic display design N.A. Dodgson, J.R. Moore 2002-08 6 p PDF (0.2 MB)
Moore, Simon William
358 Multithreaded processor design Simon William Moore 1995-02 PhD
125 p
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
851 Capability Hardware Enhanced RISC Instructions: CHERI User’s guide Robert N.M. Watson, David Chisnall, et al. 2014-04 26 p PDF (0.4 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
853 Bluespec Extensible RISC Implementation: BERI Software reference Robert N.M. Watson, David Chisnall, et al. 2014-04 34 p PDF (0.9 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
869 Bluespec Extensible RISC Implementation: BERI Software reference Robert N. M. Watson, David Chisnall, et al. 2015-04 27 p PDF (0.9 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
877 Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide Robert N. M. Watson, David Chisnall, et al. 2015-09 58 p PDF (0.4 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
916 Capability Hardware Enhanced RISC Instructions (CHERI): Notes on the Meltdown and Spectre Attacks Robert N. M. Watson, Jonathan Woodruff, et al. 2018-02 16 p PDF (0.2 MB)
Moore, Tyler
718 Cooperative attack and defense in distributed networks Tyler Moore 2008-06 PhD
172 p
PDF (1.7 MB)
Moreton, Tim
714 A wide-area file system for migrating virtual machines Tim Moreton 2008-03 PhD
163 p
PDF (1.7 MB)
Morrison, Cecily
768 Report on existing open-source electronic medical records Cecily Morrison, Adona Iosif, Miklos Danka 2010-02 12 p
colour
PDF (1.1 MB)
771 Bodies-in-Space: investigating technology usage in co-present group interaction Cecily Morrison 2010-03 PhD
147 p
PDF (4.6 MB)
Mortier, Richard
510 Switchlets and resource-assured MPLS networks Richard Mortier, Rebecca Isaacs, Keir Fraser 2000-05 16 p PDF (0.1 MB)
PS (0.1 MB)
532 Internet traffic engineering Richard Mortier 2002-04 PhD
129 p
PDF (0.8 MB)
703 Lazy Susan: dumb waiting as proof of work Jon Crowcroft, Tim Deegan, et al. 2007-11 23 p PDF (0.3 MB)
725 Beyond node degree: evaluating AS topology models Hamed Haddadi, Damien Fay, et al. 2008-07 16 p PDF (1.0 MB)
729 Weighted spectral distribution Damien Fay, Hamed Haddadi, et al. 2008-09 13 p PDF (0.2 MB)
756 Analysis of the Internet’s structural evolution Hamed Haddadi, Damien Fay, et al. 2009-09 13 p PDF (0.3 MB)
837 Human-data interaction Hamed Haddadi, Richard Mortier, et al. 2013-06 9 p PDF (0.4 MB)
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
Moszkowski, Ben
55 Executing temporal logic programs Ben Moszkowski 1984-08 27 p PDF (1.8 MB)
71 Executing temporal logic programs Ben Moszkowski 1985-08 96 p
Mullender, Sape J.
281 Pegasus project description Sape J. Mullender, Ian M. Leslie, Derek McAuley 1992-09 23 p
282 Pegasus – Operating system support for distributed multimedia systems Ian M. Leslie, Derek McAuley, Sape J. Mullender 1992-12 14 p
Murdoch, Steven J.
592 Unwrapping the Chrysalis Mike Bond, Daniel Cvrček, Steven J. Murdoch 2004-06 15 p PDF (0.4 MB)
706 Covert channel vulnerabilities in anonymity systems Steven J. Murdoch 2007-12 PhD
140 p
PDF (1.8 MB)
711 Thinking inside the box: system-level failures of tamper proofing Saar Drimer, Steven J. Murdoch, Ross Anderson 2008-02 37 p PDF (5.4 MB)
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
851 Capability Hardware Enhanced RISC Instructions: CHERI User’s guide Robert N.M. Watson, David Chisnall, et al. 2014-04 26 p PDF (0.4 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
853 Bluespec Extensible RISC Implementation: BERI Software reference Robert N.M. Watson, David Chisnall, et al. 2014-04 34 p PDF (0.9 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
869 Bluespec Extensible RISC Implementation: BERI Software reference Robert N. M. Watson, David Chisnall, et al. 2015-04 27 p PDF (0.9 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
877 Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide Robert N. M. Watson, David Chisnall, et al. 2015-09 58 p PDF (0.4 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
Murphy, Niall
882 Discovering and exploiting parallelism in DOACROSS loops Niall Murphy 2016-03 PhD
129 p
PDF (2.4 MB)
Mycroft, Alan
97 A study on abstract interpretation and “validating microcode algebraically” Alan Mycroft 1986-10 22 p
267 Untyped strictness analysis Christine Ernoult, Alan Mycroft 13 p
269 Optimising compilation Alan Mycroft, Arthur Norman 23 p
503 Hardware/software co-design using functional languages Alan Mycroft, Richard Sharp 2000-09 8 p PDF (0.1 MB)
578 Linear types for packet processing (extended version) Robert Ennals, Richard Sharp, Alan Mycroft 2004-01 31 p PDF (0.3 MB)
776 System tests from unit tests Kathryn E. Gray, Alan Mycroft 2010-03 27 p PDF (0.3 MB)
836 Aliasing contracts: a dynamic approach to alias protection Janina Voigt, Alan Mycroft 2013-06 27 p PDF (0.3 MB)
Myreen, Magnus O.
765 Formal verification of machine-code programs Magnus O. Myreen 2009-12 PhD
109 p
PDF (0.8 MB)
Nagaraja, Shishir
637 The topology of covert conflict Shishir Nagaraja, Ross Anderson 2005-07 15 p PDF (0.2 MB)
746 The snooping dragon: social-malware surveillance of the Tibetan movement Shishir Nagaraja, Ross Anderson 2009-03 12 p PDF (0.3 MB)
Nardelli, Francesco Zappa
589 new-HOPLA — a higher-order process language with name generation Glynn Winskel, Francesco Zappa Nardelli 2004-05 16 p PDF (0.3 MB)
605 Acute: High-level programming language design for distributed computation : Design rationale and language definition Peter Sewell, James J. Leifer, et al. 2004-10 193 p PDF (1.2 MB)
Needham, Roger M.
90 The Cambridge Fast Ring networking system (CFR) Andy Hopper, Roger M. Needham 1986-06 25 p PDF (0.6 MB)
138 Authentication: a practical study in belief and action Michael Burrows, Martín Abadi, Roger Needham 1988-06 19 p
168 Distributed computing with a processor bank J.M. Bacon, I.M. Leslie, R.M. Needham 1989-04 15 p PDF (0.6 MB)
355 Two cryptographic notes David Wheeler, Roger Needham 1994-11 6 p PDF (0.4 MB)
Neggatu, Natinael Solomon
912 Network traffic classification via neural networks Ang Kun Joo Michael, Emma Valla, et al. 2017-09 25 p to appear
Nesi, Monica
278 A formalization of the process algebra CCS in high order logic Monica Nesi 42 p PDF (2.1 MB)
411 Formalising process calculi in Higher Order Logic Monica Nesi 1997-01 PhD
182 p
Nestmann, Uwe
392 Decoding choice encodings Uwe Nestmann, Benjamin C. Pierce 1996-04 54 p
Nethercote, Nicholas
606 Dynamic binary analysis and instrumentation Nicholas Nethercote 2004-11 PhD
177 p
PDF (1.1 MB)
Neugebauer, Rolf
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
596 Reconstructing I/O Keir Fraser, Steven Hand, et al. 2004-08 16 p PDF (0.3 MB)
Neumann, Peter G.
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
851 Capability Hardware Enhanced RISC Instructions: CHERI User’s guide Robert N.M. Watson, David Chisnall, et al. 2014-04 26 p PDF (0.4 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
853 Bluespec Extensible RISC Implementation: BERI Software reference Robert N.M. Watson, David Chisnall, et al. 2014-04 34 p PDF (0.9 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
869 Bluespec Extensible RISC Implementation: BERI Software reference Robert N. M. Watson, David Chisnall, et al. 2015-04 27 p PDF (0.9 MB)
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
877 Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide Robert N. M. Watson, David Chisnall, et al. 2015-09 58 p PDF (0.4 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
916 Capability Hardware Enhanced RISC Instructions (CHERI): Notes on the Meltdown and Spectre Attacks Robert N. M. Watson, Jonathan Woodruff, et al. 2018-02 16 p PDF (0.2 MB)
Neville-Neil, George
924 OpenDTrace Specification version 1.0 George Neville-Neil, Jonathan Anderson, et al. 2018-08 235 p PDF (0.9 MB)
Newman, Peter
142 A fast packet switch for the integrated services backbone network Peter Newman 1988-07 24 p
165 Fast packet switching for integrated services Peter Newman 1989-03 PhD
145 p
219 Fairisle project working documents : Snapshot 1 Ian M. Leslie, Derek M. McAuley, et al. 1991-03 15 p
Ng, Irene
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
Nic Gearailt, Donnla
616 Dictionary characteristics in cross-language information retrieval Donnla Nic Gearailt 2005-02 PhD
158 p
PDF (1.2 MB)
Nicholls, Diane
915 Annotating errors and disfluencies in transcriptions of speech Andrew Caines, Diane Nicholls, Paula Buttery 2017-12 10 p PDF (0.4 MB)
Nicolaou, Cosmos Andrea
191 An architecture for real-time multimedia communications systems Cosmos Nicolaou 1990-02 30 p PDF (1.3 MB)
220 A distributed architecture for multimedia communication systems Cosmos Andrea Nicolaou PhD
192 p
Nilakant, Karthik
823 Mitigating I/O latency in SSD-based graph traversal Amitabha Roy, Karthik Nilakant, et al. 2012-11 27 p PDF (0.3 MB)
Nimscheck, Uwe Michael
381 Rendering for free form deformations Uwe Michael Nimscheck 1995-10 PhD
151 p
Nipkow, Tobias
170 Ordered rewriting and confluence Ursula Martin, Tobias Nipkow 1989-05 18 p
179 Automating Squiggol Ursula Martin, Tobias Nipkow 1989-09 16 p
180 Formal verification of data type refinement : Theory and practice Tobias Nipkow 1989-09 31 p
181 Proof transformations for equational theories Tobias Nipkow 1989-09 17 p
189 Isabelle tutorial and user’s manual Lawrence C. Paulson, Tobias Nipkow 1990-01 142 p PDF (0.5 MB)
DVI (0.1 MB)
200 Type classes and overloading resolution via order-sorted unification Tobias Nipkow, Gregor Snelting 1990-08 16 p
210 Higher-order unification, polymorphism, and subsorts Tobias Nipkow 15 p
218 Higher-order critical pairs Tobias Nipkow 15 p
Noble, James
716 UpgradeJ: Incremental typechecking for class upgrades Gavin M. Bierman, Matthew J. Parkinson, James Noble 2008-04 35 p PDF (0.5 MB)
Noel, P.A.J.
177 Experimenting with Isabelle in ZF Set Theory P.A.J. Noel 1989-09 40 p
Nopsuwanchai, Roongroj
652 Discriminative training methods and their applications to handwriting recognition Roongroj Nopsuwanchai 2005-11 PhD
186 p
PDF (2.1 MB)
Norman, Arthur
269 Optimising compilation Alan Mycroft, Arthur Norman 23 p
Norrish, Michael
421 An abstract dynamic semantics for C Michael Norrish 1997-05 31 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
453 C formalised in HOL Michael Norrish 1998-12 PhD
156 p
PDF (0.8 MB)
624 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 1: Overview Steve Bishop, Matthew Fairbairn, et al. 2005-03 88 p PDF (1.3 MB)
625 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 2: The Specification Steve Bishop, Matthew Fairbairn, et al. 2005-03 386 p PDF (2.5 MB)
742 TCP, UDP, and Sockets: Volume 3: The Service-level Specification Thomas Ridge, Michael Norrish, Peter Sewell 2009-02 305 p PDF (2.6 MB)
Norton, Robert M.
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
887 Hardware support for compartmentalisation Robert M. Norton 2016-05 PhD
86 p
PDF (1.2 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
Oakley, M.R.A.
12 HASP “IBM 1130” multileaving remote job entry protocol with extensions as used on the University of Cambridge IBM 370/165 M.R.A. Oakley, P. Hazel 1979-09 28 p PDF (1.6 MB)
O'Keeffe, Dan
783 Distributed complex event detection for pervasive computing Dan O'Keeffe 2010-07 PhD
170 p
PDF (1.3 MB)
Ong, C.-H. Luke
259 Full abstraction in the Lazy Lambda Calculus Samson Abramsky, C.-H. Luke Ong 104 p
263 The Lazy Lambda Calculus: an investigation into the foundations of functional programming C.-H. Luke Ong 1992-08 PhD
256 p
Oorschot, Paul C. van
817 The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes Joseph Bonneau, Cormac Herley, et al. 2012-03 32 p PDF (0.5 MB)
Orchard, Dominic
854 Programming contextual computations Dominic Orchard 2014-05 PhD
223 p
PDF (1.7 MB)
911 Proofs for ‘Verifying Spatial Properties of Array Computations’ Dominic Orchard, Mistral Contrastin, et al. 2017-09 8 p PDF (0.5 MB)
Ó Séaghdha, Diarmuid
735 Learning compound noun semantics Diarmuid Ó Séaghdha 2008-12 PhD
167 p
PDF (1.5 MB)
Ostilli, Massimo
767 Ising model of rumour spreading in interacting communities Massimo Ostilli, Eiko Yoneki, et al. 2010-01 24 p PDF (3.2 MB)
Ott, Joerg
841 Information centric delay tolerant networking: an internet architecture for the challenged Arjuna Sathiaseelan, Dirk Trossen, et al. 2013-09 11 p PDF (0.2 MB)
Owens, Scott
745 A better x86 memory model: x86-TSO (extended version) Scott Owens, Susmit Sarkar, Peter Sewell 2009-03 52 p PDF (0.6 MB)
Pal, Ranjan
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
Panagopoulos, George
866 PDTL: Parallel and distributed triangle listing for massive graphs Ilias Giechaskiel, George Panagopoulos, Eiko Yoneki 2015-04 14 p PDF (0.5 MB)
Paquet, Ulrich
724 Bayesian inference for latent variable models Ulrich Paquet 2008-07 PhD
137 p
PDF (2.0 MB)
Parkinson, Matthew J.
563 MJ: An imperative core calculus for Java and Java with effects G.M. Bierman, M.J. Parkinson, A.M. Pitts 2003-04 53 p PDF (0.5 MB)
654 Local reasoning for Java Matthew J. Parkinson 2005-11 PhD
120 p
PDF (1.1 MB)
687 A marriage of rely/guarantee and separation logic Viktor Vafeiadis, Matthew Parkinson 2007-06 31 p PDF (0.4 MB)
716 UpgradeJ: Incremental typechecking for class upgrades Gavin M. Bierman, Matthew J. Parkinson, James Noble 2008-04 35 p PDF (0.5 MB)
736 Deny-guarantee reasoning Mike Dodds, Xinyu Feng, et al. 2009-01 82 p PDF (0.6 MB)
759 Coarse-grained transactions (extended version) Eric Koskinen, Matthew Parkinson, Maurice Herlihy 2011-08 34 p PDF (0.6 MB)
774 Explicit stabilisation for modular rely-guarantee reasoning John Wickerson, Mike Dodds, Matthew Parkinson 2010-03 29 p PDF (0.9 MB)
777 Concurrent Abstract Predicates Thomas Dinsdale-Young, Mike Dodds, et al. 2010-04 43 p PDF (0.5 MB)
Pasquier, Thomas F. J.-M.
863 Regional clouds: technical considerations Jatinder Singh, Jean Bacon, et al. 2014-11 18 p PDF (0.6 MB)
893 Towards practical information flow control and audit Thomas F. J.-M. Pasquier 2016-07 PhD
153 p
PDF (1.5 MB)
Paul, Philip Christopher
829 Microelectronic security measures Philip Christopher Paul 2013-02 PhD
177 p
colour
PDF (12.6 MB)
Paulson, Lawrence C.
34 Recent developments in LCF: examples of structural induction Larry Paulson 1983-01 15 p PDF (0.7 MB)
35 Rewriting in Cambridge LCF Larry Paulson 1983-02 32 p DVI (0.0 MB)
36 The revised logic PPLAMBDA : A reference manual Lawrence Paulson 1983-03 28 p PDF (0.7 MB)
39 Tactics and tacticals in Cambridge LCF Lawrence Paulson 1983-07 26 p PDF (0.9 MB)
44 Structural induction in LCF Lawrence Paulson 1983-11 35 p
50 Verifying the unification algorithm in LCF Lawrence Paulson 1984-03 28 p PDF (0.2 MB)
DVI (0.0 MB)
54 Lessons learned from LCF Lawrence Paulson 1984-08 16 p PDF (1.3 MB)
57 Constructing recursion operators in intuitionistic type theory Lawrence C. Paulson 1984-10 46 p PDF (0.3 MB)
DVI (0.1 MB)
67 Natural deduction theorem proving via higher-order resolution Lawrence C. Paulson 1985-05 19 p
69 Proving termination of normalization functions for conditional expressions Lawrence C. Paulson 1985-06 16 p PDF (0.1 MB)
DVI (0.0 MB)
80 Interactive theorem proving with Cambridge LCF : A user's manual Lawrence C. Paulson 1985-11 140 p
82 Natural deduction proof as higher-order resolution Lawrence C. Paulson 1985-12 25 p PDF (0.2 MB)
DVI (0.0 MB)
113 The representation of logics in higher-order logic Lawrence C. Paulson 1987-08 29 p
130 The foundation of a generic theorem prover Lawrence C Paulson 1988-03 44 p PDF (0.2 MB)
DVI (0.1 MB)
133 A preliminary users manual for Isabelle Lawrence C. Paulson 1988-05 81 p PDF (0.3 MB)
DVI (0.1 MB)
143 Experience with Isabelle : A generic theorem prover Lawrence C. Paulson 1988-08 20 p PDF (0.2 MB)
DVI (0.0 MB)
175 A formulation of the simple theory of types (for Isabelle) Lawrence C. Paulson 1989-08 32 p PDF (0.2 MB)
DVI (0.0 MB)
189 Isabelle tutorial and user’s manual Lawrence C. Paulson, Tobias Nipkow 1990-01 142 p PDF (0.5 MB)
DVI (0.1 MB)
192 Designing a theorem prover Lawrence C. Paulson 1990-05 57 p PDF (0.3 MB)
DVI (0.1 MB)
205 Logic programming, functional programming and inductive definitions Lawrence C. Paulson, Andrew W. Smith 29 p PDF (0.2 MB)
DVI (0.0 MB)
271 Set theory as a computational logic: I. from foundations to functions Lawrence C. Paulson 1992-11 28 p PDF (0.3 MB)
DVI (0.0 MB)
280 Introduction to Isabelle Lawrence C. Paulson 1993-01 61 p DVI (0.1 MB)
283 The Isabelle reference manual Lawrence C. Paulson 1993-02 78 p DVI (0.2 MB)
286 Isabelle’s object-logics Lawrence C. Paulson 1993-02 161 p DVI (0.2 MB)
304 Co-induction and co-recursion in higher-order logic Lawrence C. Paulson 1993-07 35 p PDF (0.3 MB)
PS (0.1 MB)
DVI (0.1 MB)
312 Set theory for verification: II : Induction and recursion Lawrence C. Paulson 1993-09 46 p PDF (0.3 MB)
320 A fixedpoint approach to implementing (co)inductive definitions (updated version) Lawrence C. Paulson 1995-07 29 p PDF (0.2 MB)
DVI (0.0 MB)
334 A concrete final coalgebra theorem for ZF set theory Lawrence C. Paulson 1994-05 21 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
377 Mechanising set theory: cardinal arithmetic and the axiom of choice Larry Paulson, Krzysztof Grabczewski 1995-07 33 p PDF (0.3 MB)
PS (0.1 MB)
379 Proceedings of the First Isabelle Users Workshop Lawrence Paulson 1995-09 265 p
394 A simple formalization and proof for the mutilated chess board Lawrence C. Paulson 1996-04 11 p PDF (0.1 MB)
PS (0.0 MB)
DVI (0.0 MB)
396 Generic automatic proof tools Lawrence C. Paulson 1996-05 28 p PDF (0.2 MB)
PS (0.1 MB)
406 Tool support for logics of programs Lawrence C. Paulson 1996-11 31 p PDF (0.3 MB)
PS (0.2 MB)
409 Proving properties of security protocols by induction Lawrence C. Paulson 1996-12 24 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
413 Mechanized proofs of security protocols: Needham-Schroeder with public keys Lawrence C. Paulson 1997-01 20 p PDF (0.1 MB)
PS (0.0 MB)
DVI (0.0 MB)
418 Mechanized proofs for a recursive authentication protocol Lawrence C. Paulson 1997-03 30 p PDF (0.2 MB)
PS (0.1 MB)
425 Should your specification language be typed? Leslie Lamport, Lawrence C. Paulson 1997-05 30 p PDF (0.3 MB)
432 On two formal analyses of the Yahalom protocol Lawrence C. Paulson 1997-07 16 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
440 Inductive analysis of the internet protocol TLS Lawrence C. Paulson 1997-12 19 p PDF (0.2 MB)
PS (0.1 MB)
441 A generic tableau prover and its integration with Isabelle Lawrence C. Paulson 1998-01 16 p PDF (0.2 MB)
PS (0.1 MB)
DVI (0.0 MB)
442 A combination of nonstandard analysis and geometry theorem proving, with application to Newton’s Principia Jacques Fleuriot, Lawrence C. Paulson 1998-01 13 p PS (0.1 MB)
DVI (0.0 MB)
443 The inductive approach to verifying cryptographic protocols Lawrence C. Paulson 1998-02 46 p PDF (0.3 MB)
PS (0.2 MB)
447 Are timestamps worth the effort? A formal treatment Giampaolo Bella, Lawrence C. Paulson 1998-09 12 p PDF (0.7 MB)
452 A formal proof of Sylow’s theorem : An experiment in abstract algebra with Isabelle Hol Florian Kammüller, Lawrence C. Paulson 1998-11 30 p PDF (0.2 MB)
458 Final coalgebras as greatest fixed points in ZF set theory Lawrence C. Paulson 1999-03 25 p PDF (0.1 MB)
467 Mechanizing UNITY in Isabelle Lawrence C. Paulson 1999-06 22 p PDF (0.3 MB)
488 Formal verification of card-holder registration in SET Giampaolo Bella, Fabio Massacci, et al. 2000-03 15 p
507 Mechanizing a theory of program composition for UNITY Lawrence Paulson 2000-11 28 p PDF (0.2 MB)
524 Verifying the SET purchase protocols Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson 2001-11 14 p PDF (0.2 MB)
531 Verifying the SET registration protocols Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson 2002-03 24 p PDF (0.4 MB)
551 The relative consistency of the axiom of choice — mechanized using Isabelle/ZF Lawrence C. Paulson 2002-12 63 p PDF (0.4 MB)
573 Mechanizing compositional reasoning for concurrent systems: some lessons Lawrence C. Paulson 2003-08 20 p PDF (0.3 MB)
Pell, Barney Darryl
275 Exploratory learning in the game of GO Barney Pell 18 p PS (0.0 MB)
276 METAGAME: a new challenge for games and learning Barney Pell 15 p PS (0.0 MB)
277 METAGAME in symmetric chess-like games Barney Pell 30 p PS (0.1 MB)
299 Pragmatic reasoning in bridge Bjorn Gamback, Manny Rayner, Barney Pell 1993-04 23 p PS (0.1 MB)
302 Logic programming for general game-playing Barney Pell 1993-06 15 p PS (0.0 MB)
315 Strategy generation and evaluation for meta-game playing Barney Darryl Pell 1993-11 PhD
289 p
PS (0.4 MB)
Penrose, Andrew J.
526 Extending lossless image compression Andrew J. Penrose 2001-12 PhD
137 p
PDF (5.3 MB)
Peskine, Gilles
569 Global abstraction-safe marshalling with hash types James J. Leifer, Gilles Peskine, et al. 2003-06 86 p PDF (0.8 MB)
Pesonen, Lauri I.W.
720 A capability-based access control architecture for multi-domain publish/subscribe systems Lauri I.W. Pesonen 2008-06 PhD
175 p
PDF (2.5 MB)
Petricek, Tomas
906 Context-aware programming languages Tomas Petricek 2017-03 PhD
218 p
PDF (1.7 MB)
Pezarro, Mark Theodore
10 Prediction oriented description of database systems Mark Theodore Pezarro PhD
190 p
Pfautz, Jonathan David
546 Depth perception in computer graphics Jonathan David Pfautz 2002-09 PhD
182 p
PDF (2.0 MB)
Pierce, Benjamin C.
392 Decoding choice encodings Uwe Nestmann, Benjamin C. Pierce 1996-04 54 p
462 Location-independent communication for mobile agents: a two-level architecture Peter Sewell, Paweł T. Wojciechowski, Benjamin C. Pierce 1999-04 31 p PS (0.1 MB)
Pietzuch, Peter R.
590 Hermes: A scalable event-based middleware Peter R. Pietzuch 2004-06 PhD
180 p
PDF (1.6 MB)
Pirie, N.J.
154 A natural language interface to an intelligent planning system I.B. Crabtree, R.S. Crouch, et al. 1989-01 14 p
Pitts, Andrew M.
159 Non-trivial power types can’t be subtypes of polymorphic types Andrew M. Pitts 1989-01 12 p PS (0.1 MB)
198 Evaluation Logic Andrew M. Pitts 1990-08 31 p PS (0.1 MB)
204 New foundations for fixpoint computations: FIX-hyperdoctrines and the FIX-logic Roy L. Crole, Andrew M. Pitts 1990-08 37 p PS (0.1 MB)
252 A co-induction principle for recursively defined domains Andrew M. Pitts 25 p PS (0.1 MB)
321 Relational properties of domains Andrew M. Pitts 1993-12 38 p PS (0.2 MB)
367 Categorical logic Andrew M. Pitts 1995-05 94 p PS (0.3 MB)
DVI (0.1 MB)
454 Parametric polymorphism and operational equivalence Andrew M. Pitts 1998-12 39 p
563 MJ: An imperative core calculus for Java and Java with effects G.M. Bierman, M.J. Parkinson, A.M. Pitts 2003-04 53 p PDF (0.5 MB)
621 Fresh Objective Caml user manual Mark R. Shinwell, Andrew M. Pitts 2005-02 21 p PDF (0.2 MB)
Policroniades-Borraz, Calicrates
672 Decomposing file data into discernible items Calicrates Policroniades-Borraz 2006-08 PhD
230 p
PDF (1.6 MB)
Popescu, Diana Andreea
914 Characterizing the impact of network latency on cloud-based applications’ performance Diana Andreea Popescu, Noa Zilberman, Andrew W. Moore 2017-11 20 p PDF (0.8 MB)
Pope, Steven Leslie
415 Application support for mobile computing Steven Leslie Pope 1997-02 PhD
145 p
Powers, J.S.
14 Store to store swapping for TSO under OS/MVT J.S. Powers 1980-06 28 p PDF (1.9 MB)
Poznański, Victor
246 A relevance-based utterance processing system Victor Poznański 1992-02 PhD
295 p
PDF (18.5 MB)
Pratt, Ian A.
552 The Xenoserver computing infrastructure Keir A. Fraser, Steven M. Hand, et al. 2003-01 11 p PDF (0.2 MB)
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
596 Reconstructing I/O Keir Fraser, Steven Hand, et al. 2004-08 16 p PDF (0.3 MB)
Preiss, Judita
673 Probabilistic word sense disambiguation : Analysis and techniques for combining knowledge sources Judita Preiss 2006-08 PhD
108 p
PDF (0.8 MB)
Pribadi, Haikal
855 Mephistophone Patrick K.A. Wollner, Isak Herman, et al. 2014-06 8 p PDF (1.1 MB)
Price, Geraint
479 The interaction between fault tolerance and security Geraint Price 1999-12 PhD
144 p
PDF (0.9 MB)
Proust, Raphaël L.
908 ASAP: As Static As Possible memory management Raphaël L. Proust 2017-07 PhD
147 p
PDF (1.0 MB)
Pullen, Andrew Mark
152 Motion development for computer animation Andrew Mark Pullen 1988-11 PhD
163 p
Pulman, Stephen G.
154 A natural language interface to an intelligent planning system I.B. Crabtree, R.S. Crouch, et al. 1989-01 14 p
155 Computational morphology of English S.G. Pulman, G.J. Russell, et al. 1989-01 15 p PDF (1.0 MB)
156 Events and VP modifiers Steve Pulman 1989-01 10 p
223 Shallow processing and automatic summarising: a first study Philip Gladwin, Stephen Pulman, Karen Spärck Jones 1991-05 65 p
373 Natural-language processing and requirements specifications Benjamín Macías, Stephen G. Pulman 1995-07 73 p
Purcell, Chris J.
639 Non-blocking hashtables with open addressing Chris Purcell, Tim Harris 2005-09 23 p PDF (0.3 MB)
697 Scaling Mount Concurrency: scalability and progress in concurrent algorithms Chris J. Purcell 2007-08 PhD
155 p
PDF (1.0 MB)
Ramos, Fernando M. V.
747 An estimator of forward and backward delay for multipath transport Fei Song, Hongke Zhang, et al. 2009-03 16 p PDF (0.8 MB)
826 GREEN IPTV: a resource and energy efficient network for IPTV Fernando M. V. Ramos 2012-12 PhD
152 p
PDF (3.8 MB)
Rasmussen, Ole
364 The Church-Rosser theorem in Isabelle: a proof porting experiment Ole Rasmussen 1995-04 27 p PS (0.1 MB)
Rasmussen, Thomas Marthedal
502 Formalizing basic number theory Thomas Marthedal Rasmussen 2000-09 20 p
Rayner, Manny
299 Pragmatic reasoning in bridge Bjorn Gamback, Manny Rayner, Barney Pell 1993-04 23 p PS (0.1 MB)
Reams, Charles
821 Modelling energy efficiency for computation Charles Reams 2012-10 PhD
135 p
PDF (1.8 MB)
Reece, Stenev
243 Automating the librarian: a fundamental approach using belief revision Alison Cawsey, Julia Galliers, et al. 1992-01 39 p
Reece, Steven
339 Belief revision and dialogue management in information retrieval Brian Logan, Steven Reece, et al. 1994-05 227 p PDF (13.3 MB)
Rees, Gareth D.
386 Bisimilarity for a first-order calculus of objects with subtyping Andrew D. Gordon, Gareth D. Rees 1996-01 78 p
Rehman, Kasim
634 Visualisation, interpretation and use of location-aware interfaces Kasim Rehman 2005-05 PhD
159 p
PDF (2.8 MB)
Rei, Marek
840 Minimally supervised dependency-based methods for natural language processing Marek Rei 2013-09 PhD
169 p
PDF (1.1 MB)
Reis, Ben Y.
472 Simulating music learning with autonomous listening agents: entropy, ambiguity and context Ben Y. Reis 1999-09 PhD
200 p
Rice, Andrew C.
686 Dependable systems for Sentient Computing Andrew C. Rice 2007-05 150 p PDF (1.9 MB)
784 Characterizing 10 Gbps network interface energy consumption Ripduman Sohan, Andrew Rice, et al. 2010-07 10 p PDF (0.2 MB)
859 Resourceful: fine-grained resource accounting for explaining service variability Lucian Carata, Oliver Chick, et al. 2014-09 12 p PDF (0.4 MB)
889 Evaluating the viability of remote renewable energy in datacentre computing Sherif Akoush, Ripduman Sohan, et al. 2016-05 26 p PDF (0.6 MB)
911 Proofs for ‘Verifying Spatial Properties of Array Computations’ Dominic Orchard, Mistral Contrastin, et al. 2017-09 8 p PDF (0.5 MB)
Richards, Martin
84 BSPL: a language for describing the behaviour of synchronous hardware Martin Richards 1986-04 56 p
256 MCPL programming manual Martin Richards 1992-05 32 p
431 The MCPL programming manual and user guide Martin Richards 1997-07 70 p
433 Backtracking algorithms in MCPL using bit patterns and recursion Martin Richards 1997-07 80 p
434 Demonstration programs for CTL and μ-calculus symbolic model checking Martin Richards 1997-08 41 p
Richardson, Alex
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
Richardt, Christian
712 Flash-exposure high dynamic range imaging: virtual photography and depth-compensating flash Christian Richardt 2008-03 9 p PDF (2.6 MB)
815 Colour videos with depth: acquisition, processing and evaluation Christian Richardt 2012-03 PhD
132 p
colour
PDF (68.7 MB)
Rideau, François-René
919 Proceedings of the 2017 Scheme and Functional Programming Workshop Nada Amin, François-René Rideau 2018-03 50 p PDF (2.8 MB)
Ridge, Thomas
742 TCP, UDP, and Sockets: Volume 3: The Service-level Specification Thomas Ridge, Michael Norrish, Peter Sewell 2009-02 305 p PDF (2.6 MB)
Rio, Miguel
725 Beyond node degree: evaluating AS topology models Hamed Haddadi, Damien Fay, et al. 2008-07 16 p PDF (1.0 MB)
Ritchie, Anna
661 Compatible RMRS representations from RASP and the ERG Anna Ritchie 2006-03 41 p PDF (1.1 MB)
744 Citation context analysis for information retrieval Anna Ritchie 2009-03 PhD
119 p
PDF (0.8 MB)
Ritchie, G.D.
154 A natural language interface to an intelligent planning system I.B. Crabtree, R.S. Crouch, et al. 1989-01 14 p
155 Computational morphology of English S.G. Pulman, G.J. Russell, et al. 1989-01 15 p PDF (1.0 MB)
Ritter, Eike
208 Categorical combinators for the calculus of constructions Eike Ritter 1990-10 43 p
297 Categorical abstract machines for higher-order lambda calculi Eike Ritter 1993-04 PhD
149 p
Rivest, Ronald L.
644 Robbing the bank with a theorem prover Paul Youn, Ben Adida, et al. 2005-08 26 p PDF (0.2 MB)
Robertson, S.E.
356 Simple, proven approaches to text retrieval S.E. Robertson, K. Spärck Jones 1994-12 8 p PDF (0.2 MB)
446 A probabilistic model of information and retrieval: development and status K. Spärck Jones, S. Walker, S.E. Robertson 1998-08 74 p PS (0.2 MB)
DVI (0.1 MB)
Robič, Borut
397 Optimal routing in 2-jump circulant networks Borut Robič 1996-06 7 p PS (0.1 MB)
Robinson, E.
98 Power-domains, modalities and the Vietoris monad E. Robinson 1986-10 16 p PDF (1.1 MB)
Robinson, Peter
538 The Escritoire: A personal projected display for interacting with documents Mark Ashdown, Peter Robinson 2002-06 12 p PDF (0.5 MB)
Robson, M.
22 Constraints in CODD M. Robson 18 p PDF (1.1 MB)
Robson, Michael
62 Constraint enforcement in a relational database management system Michael Robson PhD
106 p
Rodden, Kerry
543 Evaluating similarity-based visualisations as interfaces for image browsing Kerry Rodden 2002-09 PhD
248 p
colour
PDF (8.3 MB)
Roe, Michael
445 Secure sessions from weak secrets Michael Roe, Bruce Christianson, David Wheeler 1998-07 12 p PDF (1.0 MB)
780 Cryptography and evidence Michael Roe 2010-05 PhD
75 p
PDF (0.5 MB)
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
916 Capability Hardware Enhanced RISC Instructions (CHERI): Notes on the Meltdown and Spectre Attacks Robert N. M. Watson, Jonathan Woodruff, et al. 2018-02 16 p PDF (0.2 MB)
Rooney, Sean
451 The structure of open ATM control architectures Sean Rooney 1998-11 PhD
183 p
Roscoe, Timothy
376 The structure of a multi-service operating system Timothy Roscoe 1995-08 PhD
113 p
PS (0.4 MB)
Ross, Joshua Robert Xavier
456 An evaluation based approach to process calculi Joshua Robert Xavier Ross 1999-01 PhD
206 p
Ross, Russell Glen
690 Cluster storage for commodity computation Russell Glen Ross 2007-06 PhD
178 p
PDF (1.3 MB)
Rowstron, Antony
422 Using the BONITA primitives: a case study Antony Rowstron 1997-05 19 p
Roy, Amitabha
801 Software lock elision for x86 machine code Amitabha Roy 2011-07 PhD
154 p
PDF (1.4 MB)
820 A unified graph query layer for multiple databases Eiko Yoneki, Amitabha Roy 2012-08 22 p PDF (0.3 MB)
823 Mitigating I/O latency in SSD-based graph traversal Amitabha Roy, Karthik Nilakant, et al. 2012-11 27 p PDF (0.3 MB)
Rrustemi, Alban
732 Computing surfaces – a platform for scalable interactive displays Alban Rrustemi 2008-11 PhD
156 p
PDF (5.0 MB)
Russell, G.J.
155 Computational morphology of English S.G. Pulman, G.J. Russell, et al. 1989-01 15 p PDF (1.0 MB)
Russell, Richard A.
822 Planning with preferences using maximum satisfiability Richard A. Russell 2012-10 PhD
160 p
PDF (2.0 MB)
883 Survey propagation applied to weighted partial maximum satisfiability Richard Russell, Sean B. Holden 2016-03 15 p PDF (0.3 MB)
Rymer, Graham
922 Raising a new generation of cyber defenders Frank Stajano, Graham Rymer, Michelle Houghton 2018-06 307 p PDF (68.6 MB)
Rymill, Stephen Julian
717 Psychologically-based simulation of human behaviour Stephen Julian Rymill 2008-06 PhD
250 p
PDF (25.5 MB)
Saacti, Y.
676 Road traffic analysis using MIDAS data: journey time prediction R.J. Gibbens, Y. Saacti 2006-12 35 p PDF (4.6 MB)
Sabin, Malcolm A.
539 Towards a ternary interpolating subdivision scheme for the triangular mesh N.A. Dodgson, M.A. Sabin, et al. 2002-07 12 p PDF (0.2 MB)
541 Different applications of two-dimensional potential fields for volume modeling L. Barthe, N.A. Dodgson, et al. 2002-08 26 p PDF (1.9 MB)
542 A generative classification of mesh refinement rules with lattice transformations I.P. Ivrissimtzis, N.A. Dodgson, M.A. Sabin 2002-09 13 p PDF (0.2 MB)
544 On the support of recursive subdivision I.P. Ivrissimtzis, M.A. Sabin, N.A. Dodgson 2002-09 20 p PDF (4.0 MB)
583 Subdivision as a sequence of sampled Cp surfaces and conditions for tuning schemes Cédric Gérot, Loïc Barthe, et al. 2004-03 68 p PDF (0.5 MB)
689 Removing polar rendering artifacts in subdivision surfaces Ursula H. Augsdörfer, Neil A. Dodgson, Malcolm A. Sabin 2007-06 7 p PDF (0.5 MB)
691 Preconditions on geometrically sensitive subdivision schemes Neil A. Dodgson, Malcolm A. Sabin, Richard Southern 2007-08 13 p PDF (0.5 MB)
Saif, Umar
527 Architectures for ubiquitous systems Umar Saif 2002-01 PhD
271 p
PDF (2.4 MB)
Sakai, Tetsuya
513 Generic summaries for indexing in information retrieval – Detailed test results Tetsuya Sakai, Karen Spärck Jones 2001-05 29 p PS (0.1 MB)
Sanfilippo, Antonio
253 The (other) Cambridge ACQUILEX papers Antonio Sanfilippo 141 p
Saraswat, Sanjay
385 Performance evaluation of the Delphi machine Sanjay Saraswat 1995-12 PhD
187 p
Sarkar, Advait
920 Interactive analytical modelling Advait Sarkar 2018-05 PhD
142 p
colour
PDF (9.7 MB)
Sarkar, Susmit
745 A better x86 memory model: x86-TSO (extended version) Scott Owens, Susmit Sarkar, Peter Sewell 2009-03 52 p PDF (0.6 MB)
Sathiaseelan, Arjuna
814 The free Internet: a distant mirage or near reality? Arjuna Sathiaseelan, Jon Crowcroft 2012-02 10 p PDF (0.1 MB)
841 Information centric delay tolerant networking: an internet architecture for the challenged Arjuna Sathiaseelan, Dirk Trossen, et al. 2013-09 11 p PDF (0.2 MB)
Schoenberg, Sebastian
407 The L4 microkernel on Alpha : Design and implementation Sebastian Schoenberg 1996-09 51 p PS (0.1 MB)
Schwiderski, Scarlet
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
387 Monitoring composite events in distributed systems Scarlet Schwiderski, Andrew Herbert, Ken Moody 1996-02 20 p
400 Monitoring the behaviour of distributed systems Scarlet Schwiderski 1996-07 PhD
161 p
PDF (1.0 MB)
Scott, David J.
609 Using camera-phones to interact with context-aware mobile services Eleanor Toye, Anil Madhavapeddy, et al. 2004-12 23 p PDF (0.4 MB)
613 Abstracting application-level security policy for ubiquitous computing David J. Scott 2005-01 PhD
186 p
PDF (2.2 MB)
Scott, James
617 Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding Augustin Chaintreau, Pan Hui, et al. 2005-02 26 p PDF (0.8 MB)
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
Seaborne, Andrew Franklin
169 Filing in a heterogeneous network Andrew Franklin Seaborne 1989-04 PhD
131 p
Serban, Ovidiu
881 Web data knowledge extraction Juan M. Tirado, Ovidiu Serban, et al. 2016-03 60 p PDF (0.7 MB)
Serjantov, Andrei
515 The UDP calculus: rigorous semantics for real networking Andrei Serjantov, Peter Sewell, Keith Wansbrough 2001-07 70 p PS (0.3 MB)
604 On the anonymity of anonymity systems Andrei Serjantov 2004-10 PhD
162 p
PDF (0.9 MB)
Sewell, Jonathan Mark
420 Managing complex models for computer graphics Jonathan Mark Sewell 1997-04 PhD
206 p
PDF (14.3 MB)
Sewell, Peter
435 Global/local subtyping for a distributed π-calculus Peter Sewell 1997-08 57 p PS (0.2 MB)
444 From rewrite rules to bisimulation congruences Peter Sewell 1998-05 72 p PS (0.3 MB)
462 Location-independent communication for mobile agents: a two-level architecture Peter Sewell, Paweł T. Wojciechowski, Benjamin C. Pierce 1999-04 31 p PS (0.1 MB)
463 Secure composition of insecure components Peter Sewell, Jan Vitek 1999-04 44 p PS (0.2 MB)
478 Secure composition of untrusted code: wrappers and causality types Peter Sewell, Jan Vitek 1999-11 36 p PS (0.2 MB)
498 Applied π – a brief tutorial Peter Sewell 2000-07 65 p PDF (0.4 MB)
PS (0.2 MB)
505 Models for name-passing processes: interleaving and causal Gian Luca Cattani, Peter Sewell 2000-09 42 p PDF (0.5 MB)
PS (0.2 MB)
DVI (0.1 MB)
506 Modules, abstract types, and distributed versioning Peter Sewell 2000-09 46 p PDF (0.4 MB)
PS (0.2 MB)
DVI (0.1 MB)
515 The UDP calculus: rigorous semantics for real networking Andrei Serjantov, Peter Sewell, Keith Wansbrough 2001-07 70 p PS (0.3 MB)
557 Iota: A concurrent XML scripting language with applications to Home Area Networking G.M. Bierman, P. Sewell 2003-01 32 p PDF (0.3 MB)
568 Dynamic rebinding for marshalling and update, with destruct-time λ Gavin Bierman, Michael Hicks, et al. 2004-02 85 p PDF (0.7 MB)
569 Global abstraction-safe marshalling with hash types James J. Leifer, Gilles Peskine, et al. 2003-06 86 p PDF (0.8 MB)
605 Acute: High-level programming language design for distributed computation : Design rationale and language definition Peter Sewell, James J. Leifer, et al. 2004-10 193 p PDF (1.2 MB)
624 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 1: Overview Steve Bishop, Matthew Fairbairn, et al. 2005-03 88 p PDF (1.3 MB)
625 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 2: The Specification Steve Bishop, Matthew Fairbairn, et al. 2005-03 386 p PDF (2.5 MB)
742 TCP, UDP, and Sockets: Volume 3: The Service-level Specification Thomas Ridge, Michael Norrish, Peter Sewell 2009-02 305 p PDF (2.6 MB)
745 A better x86 memory model: x86-TSO (extended version) Scott Owens, Susmit Sarkar, Peter Sewell 2009-03 52 p PDF (0.6 MB)
Shand, Brian Ninham
600 Trust for resource control: Self-enforcing automatic rational contracts between computers Brian Ninham Shand 2004-08 PhD
154 p
PDF (1.1 MB)
Shapiro, Marc
659 A safety proof of a lazy concurrent list-based set implementation Viktor Vafeiadis, Maurice Herlihy, et al. 2006-01 19 p PDF (0.2 MB)
Sharad, Kumar
896 Learning to de-anonymize social networks Kumar Sharad 2016-12 PhD
158 p
PDF (6.9 MB)
Sharp, Richard
503 Hardware/software co-design using functional languages Alan Mycroft, Richard Sharp 2000-09 8 p PDF (0.1 MB)
578 Linear types for packet processing (extended version) Robert Ennals, Richard Sharp, Alan Mycroft 2004-01 31 p PDF (0.3 MB)
609 Using camera-phones to interact with context-aware mobile services Eleanor Toye, Anil Madhavapeddy, et al. 2004-12 23 p PDF (0.4 MB)
Shi, Feng
438 An architecture for scalable and deterministic video servers Feng Shi 1997-11 PhD
148 p
PDF (11.3 MB)
Shinwell, Mark R.
618 The Fresh Approach: functional programming with names and binders Mark R. Shinwell 2005-02 PhD
111 p
PDF (0.9 MB)
621 Fresh Objective Caml user manual Mark R. Shinwell, Andrew M. Pitts 2005-02 21 p PDF (0.2 MB)
Shum, Kam Hong
404 Adaptive parallelism for computing on heterogeneous clusters Kam Hong Shum 1996-11 PhD
147 p
Shutova, Ekaterina V.
803 Computational approaches to figurative language Ekaterina V. Shutova 2011-08 PhD
219 p
PDF (1.8 MB)
Siddharthan, Advaith
597 Syntactic simplification and text cohesion Advaith Siddharthan 2004-08 PhD
195 p
PDF (1.3 MB)
Simon, Laurent
909 Exploring new attack vectors for the exploitation of smartphones Laurent Simon 2017-07 PhD
167 p
PDF (3.3 MB)
Singer, Jeremy
660 Static program analysis based on virtual register renaming Jeremy Singer 2006-02 PhD
183 p
PDF (1.6 MB)
Singh, Jatinder
770 Controlling the dissemination and disclosure of healthcare events Jatinder Singh 2010-02 PhD
193 p
PDF (4.2 MB)
847 SBUS: a generic policy-enforcing middleware for open pervasive systems Jatinder Singh, Jean Bacon 2014-02 20 p PDF (1.9 MB)
863 Regional clouds: technical considerations Jatinder Singh, Jean Bacon, et al. 2014-11 18 p PDF (0.6 MB)
Skorobogatov, Sergei P.
536 Low temperature data remanence in static RAM Sergei Skorobogatov 2002-06 9 p PDF (0.6 MB)
630 Semi-invasive attacks – A new approach to hardware security analysis Sergei P. Skorobogatov 2005-04 PhD
144 p
PDF (11.8 MB)
641 Cryptographic processors – a survey Ross Anderson, Mike Bond, et al. 2005-08 19 p PDF (0.6 MB)
Smith, Andrew W.
205 Logic programming, functional programming and inductive definitions Lawrence C. Paulson, Andrew W. Smith 29 p PDF (0.2 MB)
DVI (0.0 MB)
Smith, Julian M.
766 Towards robust inexact geometric computation Julian M. Smith 2009-12 PhD
186 p
colour
PDF (1.9 MB)
Smith, Michael
624 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 1: Overview Steve Bishop, Matthew Fairbairn, et al. 2005-03 88 p PDF (1.3 MB)
625 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 2: The Specification Steve Bishop, Matthew Fairbairn, et al. 2005-03 386 p PDF (2.5 MB)
Smith, Steven
633 On deadlock, livelock, and forward progress Alex Ho, Steven Smith, Steven Hand 2005-05 8 p PDF (0.2 MB)
Smowton, Christopher S.F.
865 I/O Optimisation and elimination via partial evaluation Christopher S.F. Smowton 2014-12 PhD
129 p
PDF (1.1 MB)
Snee, James
859 Resourceful: fine-grained resource accounting for explaining service variability Lucian Carata, Oliver Chick, et al. 2014-09 12 p PDF (0.4 MB)
Snelting, Gregor
200 Type classes and overloading resolution via order-sorted unification Tobias Nipkow, Gregor Snelting 1990-08 16 p
Sobol-Shikler, Tal
740 Analysis of affective expression in speech Tal Sobol-Shikler 2009-01 PhD
163 p
PDF (2.7 MB)
Sohan, Ripduman
784 Characterizing 10 Gbps network interface energy consumption Ripduman Sohan, Andrew Rice, et al. 2010-07 10 p PDF (0.2 MB)
859 Resourceful: fine-grained resource accounting for explaining service variability Lucian Carata, Oliver Chick, et al. 2014-09 12 p PDF (0.4 MB)
888 Recomputation-based data reliability for MapReduce using lineage Sherif Akoush, Ripduman Sohan, Andy Hopper 2016-05 19 p PDF (0.5 MB)
889 Evaluating the viability of remote renewable energy in datacentre computing Sherif Akoush, Ripduman Sohan, et al. 2016-05 26 p PDF (0.6 MB)
Song, Fei
747 An estimator of forward and backward delay for multipath transport Fei Song, Hongke Zhang, et al. 2009-03 16 p PDF (0.8 MB)
Sonnex, William
905 Fixed point promotion: taking the induction out of automated induction William Sonnex 2017-03 PhD
170 p
PDF (0.9 MB)
Son, Stacey
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
Southern, Richard
691 Preconditions on geometrically sensitive subdivision schemes Neil A. Dodgson, Malcolm A. Sabin, Richard Southern 2007-08 13 p PDF (0.5 MB)
699 A smooth manifold based construction of approximating lofted surfaces Richard Southern, Neil A. Dodgson 2007-10 17 p PDF (1.8 MB)
723 Animation manifolds for representing topological alteration Richard Southern 2008-07 PhD
131 p
PDF (6.7 MB)
Spärck Jones, Karen
17 Three papers on parsing B.K. Boguraev, K. Spärck Jones, J.I. Tait 1982 22 p PDF (1.3 MB)
24 Steps towards natural language to data language translation using general semantic information B.K. Boguraev, K. Spärck Jones 1982-03 8 p PDF (0.5 MB)
32 How to drive a database front end using general semantic information B.K. Boguraev, K. Spärck Jones 1982-11 20 p PDF (1.3 MB)
45 Compound noun interpretation problems Karen Spärck Jones 1983-07 16 p PDF (1.2 MB)
61 User models and expert systems Karen Spärck Jones 1984-12 44 p PDF (2.2 MB)
64 A framework for inference in natural language front ends to databases Branimir K. Boguraev, Karen Spärck Jones 1985-02 73 p
111 Realism about user modelling K. Spärck Jones 1987-06 32 p PDF (1.9 MB)
118 Material concerning a study of cases B.K. Boguraev, K. Spärck Jones 1987-05 31 p
131 Architecture problems in the construction of expert systems for document retrieval Karen Spärck Jones 1986-12 28 p
158 Tailoring output to the user: What does user modelling in generation mean? Karen Spärck Jones 1988-08 21 p PDF (1.6 MB)
163 Inference in a natural language front end for databases Ann Copestake, Karen Spärck Jones 1989-02 87 p PDF (0.5 MB)
187 Natural language interfaces to databases Ann Copestake, Karen Spärck Jones 1989-09 36 p PS (0.1 MB)
211 The role of artificial intelligence in information retrieval Karen Spärck Jones 1990-11 13 p
223 Shallow processing and automatic summarising: a first study Philip Gladwin, Stephen Pulman, Karen Spärck Jones 1991-05 65 p
234 Two tutorial papers: Information retrieval & Thesaurus Karen Spärck Jones 1991-08 31 p PDF (2.3 MB)
243 Automating the librarian: a fundamental approach using belief revision Alison Cawsey, Julia Galliers, et al. 1992-01 39 p
290 Discourse modelling for automatic summarising Karen Spärck Jones 1993-02 30 p
291 Evaluating natural language processing systems J.R. Galliers, K. Spärck Jones 1993-02 187 p PS (0.2 MB)
307 Natural language processing for information retrieval David D. Lewis, Karen Spärck Jones 1993-07 22 p PS (0.1 MB)
335 Video mail retrieval using voice: report on keyword definition and data collection (deliverable report on VMR task No. 1) G.J.F. Jones, J.T. Foote, et al. 1994-04 38 p PDF (1.7 MB)
339 Belief revision and dialogue management in information retrieval Brian Logan, Steven Reece, et al. 1994-05 227 p PDF (13.3 MB)
347 Reflections on TREC Karen Spärck Jones 1994-07 35 p PS (0.1 MB)
DVI (0.1 MB)
356 Simple, proven approaches to text retrieval S.E. Robertson, K. Spärck Jones 1994-12 8 p PDF (0.2 MB)
366 Retrieving spoken documents: VMR Project experiments K. Spärck Jones, G.J.F. Jones, et al. 1995-05 28 p
402 Video mail retrieval using voice: report on collection of naturalistic requests and relevance assessments G.J.F. Jones, J.T. Foote, et al. 1996-09 21 p
430 Video mail retrieval using voice : Report on topic spotting G.J.F. Jones, J.T. Foote, et al. 1997-07 73 p
446 A probabilistic model of information and retrieval: development and status K. Spärck Jones, S. Walker, S.E. Robertson 1998-08 74 p PS (0.2 MB)
DVI (0.1 MB)
513 Generic summaries for indexing in information retrieval – Detailed test results Tetsuya Sakai, Karen Spärck Jones 2001-05 29 p PS (0.1 MB)
517 The Cambridge Multimedia Document Retrieval Project: summary of experiments Karen Spärck Jones, P. Jourlin, et al. 2001-07 30 p PS (0.1 MB)
DVI (0.0 MB)
550 Computer security – a layperson’s guide, from the bottom up Karen Spärck Jones 2002-06 23 p PDF (0.2 MB)
632 Between shallow and deep: an experiment in automatic summarising R.I. Tucker, K. Spärck Jones 2005-04 34 p PDF (0.3 MB)
655 Wearing proper combinations Karen Spärck Jones 2005-11 27 p PDF (0.3 MB)
679 Automatic summarising: a review and discussion of the state of the art Karen Spärck Jones 2007-01 67 p PDF (0.6 MB)
Spence, David R.
576 An implementation of a coordinate based location system David R. Spence 2003-11 12 p PDF (0.9 MB)
Spiteri, Mark David
494 An architecture for the notification, storage and retrieval of events Mark David Spiteri 2000-07 PhD
165 p
Sreenan, Cormac John
292 Synchronisation services for digital continuous media Cormac John Sreenan 1993-03 PhD
123 p
PS (0.3 MB)
Srinivasan, James R.
800 Improving cache utilisation James R. Srinivasan 2011-06 PhD
184 p
PDF (3.4 MB)
Srinivasan, Sriram
769 Kilim: A server framework with lightweight actors, isolation types and zero-copy messaging Sriram Srinivasan 2010-02 PhD
127 p
PDF (1.4 MB)
Stafford-Fraser, James Quentin
419 Video-augmented environments James Quentin Stafford-Fraser 1997-04 PhD
91 p
PDF (2.4 MB)
Stajano, Frank
645 RFID is X-ray vision Frank Stajano 2005-08 10 p PDF (0.1 MB)
754 Understanding scam victims: seven principles for systems security Frank Stajano, Paul Wilson 2009-08 22 p PDF (0.3 MB)
817 The quest to replace passwords: a framework for comparative evaluation of Web authentication schemes Joseph Bonneau, Cormac Herley, et al. 2012-03 32 p PDF (0.5 MB)
922 Raising a new generation of cyber defenders Frank Stajano, Graham Rymer, Michelle Houghton 2018-06 307 p PDF (68.6 MB)
Staples, Mark
476 Linking ACL2 and HOL Mark Staples 1999-11 23 p
Stark, Ian
363 Names and higher-order functions Ian Stark 1995-04 PhD
140 p
PS (0.3 MB)
DVI (0.2 MB)
Staton, Sam
647 An agent architecture for simulation of end-users in programming-like tasks Sam Staton 2005-10 12 p PDF (0.2 MB)
688 Name-passing process calculi: operational models and structural operational semantics Sam Staton 2007-06 PhD
245 p
PDF (2.1 MB)
Stead, Alistair G.
890 Using multiple representations to develop notational expertise in programming Alistair G. Stead 2016-06 PhD
301 p
PDF (24.8 MB)
Stewart, Daryl
485 Three notes on the interpretation of Verilog Daryl Stewart, Myra VanInwegen 2000-01 47 p
Stiller, Burkhard
368 CogPiT – configuration of protocols in TIP Burkhard Stiller 1995-06 73 p PS (0.2 MB)
374 A framework for QoS updates in a networking environment Burkhard Stiller 1995-07 PS (0.1 MB)
380 Quality-of-Service issues in networking environments Burkhard Stiller 1995-09 68 p PS (0.2 MB)
Stolfa, Domagoj
924 OpenDTrace Specification version 1.0 George Neville-Neil, Jonathan Anderson, et al. 2018-08 235 p PDF (0.9 MB)
Stoneley, A.J.M.
3 A replacement for the OS/360 disc space management routines A.J.M. Stoneley 1975-04 7 p PDF (0.6 MB)
4 The dynamic creation of I/O paths under OS/360-MVT A.J.M. Stoneley 1975-04 16 p PDF (0.9 MB)
5 Parrot – A replacement for TCAM P. Hazel, A.J.M. Stoneley 1976-04 25 p PDF (1.2 MB)
Stoye, W.
40 The SKIM microprogrammer’s guide W. Stoye 1983-10 33 p PDF (1.8 MB)
Stoye, William
56 A new scheme for writing functional operating systems William Stoye 1984-09 30 p PDF (2.5 MB)
Stoye, William Robert
81 The implementation of functional languages using custom hardware William Robert Stoye 1985-12 PhD
151 p
PDF (7.2 MB)
Stoyle, Gareth
568 Dynamic rebinding for marshalling and update, with destruct-time λ Gavin Bierman, Michael Hicks, et al. 2004-02 85 p PDF (0.7 MB)
Street, Alice
760 Radical innovation: crossing knowledge boundaries with interdisciplinary teams Alan F. Blackwell, Lee Wilson, et al. 2009-11 124 p PDF (0.7 MB)
Su, Jing
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
Su, Karen
695 Efficient maximum-likelihood decoding of spherical lattice codes Karen Su, Inaki Berenguer, et al. 2007-07 29 p PDF (0.4 MB)
Sultana, Nikolai
867 Higher-order proof translation Nikolai Sultana 2015-04 PhD
158 p
PDF (2.7 MB)
Sultana, Robert
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
Sutherland, Ivan Edward
574 Sketchpad: A man-machine graphical communication system Ivan Edward Sutherland 2003-09 PhD
149 p
PDF (4.1 MB)
Swierstra, Doaitse
487 Sequential program composition in UNITY Tanja Vos, Doaitse Swierstra 2000-03 20 p
Syme, Donald
416 DECLARE: a prototype declarative proof system for higher order logic Donald Syme 1997-02 25 p
427 Proving Java type soundness Don Syme 1997-06 35 p
Taherian, Salman
739 State-based Publish/Subscribe for sensor systems Salman Taherian 2009-01 PhD
240 p
PDF (4.1 MB)
Tait, John Irving
17 Three papers on parsing B.K. Boguraev, K. Spärck Jones, J.I. Tait 1982 22 p PDF (1.3 MB)
23 Two papers about the scrabble summarising system J.I. Tait 12 p PDF (0.7 MB)
47 Automatic summarising of English texts John Irving Tait PhD
137 p
PDF (8.0 MB)
Tarkoma, Sasu
925 Privacy markets in the Apps and IoT age Ranjan Pal, Jon Crowcroft, et al. 2018-09 45 p PDF (1.7 MB)
Tate, B.A.
154 A natural language interface to an intelligent planning system I.B. Crabtree, R.S. Crouch, et al. 1989-01 14 p
Temple, Steven
52 The design of a ring communication network Steven Temple PhD
132 p
PDF (6.3 MB)
Tennenhouse, David Lawrence
184 Site interconnection and the exchange architecture David Lawrence Tennenhouse 1989-10 PhD
225 p
Théry, Laurent
313 Proof by pointing Yves Bertot, Gilles Kahn, Laurent Théry 1993-10 27 p
Thomas, Arun
924 OpenDTrace Specification version 1.0 George Neville-Neil, Jonathan Anderson, et al. 2018-08 235 p PDF (0.9 MB)
Thomas, James Richard
486 Stretching a point: aspect and temporal discourse James Richard Thomas 2000-02 PhD
251 p
Thompson, Sarah
670 On the application of program analysis and transformation to high reliability hardware Sarah Thompson 2006-07 PhD
215 p
PDF (5.8 MB)
Tillotson, Mark
65 Introduction to the programming language “Ponder” Mark Tillotson 1985-05 57 p
Tirado, Juan M.
881 Web data knowledge extraction Juan M. Tirado, Ovidiu Serban, et al. 2016-03 60 p PDF (0.7 MB)
Togia, Theodosia
875 The language of collaborative tagging Theodosia Togia 2015-09 PhD
203 p
colour
PDF (28.2 MB)
Toye, Eleanor
609 Using camera-phones to interact with context-aware mobile services Eleanor Toye, Anil Madhavapeddy, et al. 2004-12 23 p PDF (0.4 MB)
Tramontano, Piero
488 Formal verification of card-holder registration in SET Giampaolo Bella, Fabio Massacci, et al. 2000-03 15 p
Trigoni, Agathoniki
497 Towards a formal type system for ODMG OQL G.M. Bierman, A. Trigoni 2000-09 20 p
547 Semantic optimization of OQL queries Agathoniki Trigoni 2002-10 PhD
171 p
PDF (1.2 MB)
Trossen, Dirk
841 Information centric delay tolerant networking: an internet architecture for the challenged Arjuna Sathiaseelan, Dirk Trossen, et al. 2013-09 11 p PDF (0.2 MB)
Tsipenyuk, Gregory Y.
918 Evaluation of decentralized email architecture and social network analysis based on email attachment sharing Gregory Y. Tsipenyuk 2018-03 PhD
153 p
PDF (2.7 MB)
Tucker, Richard
484 Automatic summarising and the CLASP system Richard Tucker 2000-01 PhD
190 p
PDF (0.9 MB)
632 Between shallow and deep: an experiment in automatic summarising R.I. Tucker, K. Spärck Jones 2005-04 34 p PDF (0.3 MB)
Tuddenham, Philip
734 Tabletop interfaces for remote collaboration Philip Tuddenham 2008-12 PhD
243 p
PDF (23.5 MB)
Tuerk, Thomas
799 A separation logic framework for HOL Thomas Tuerk 2011-06 PhD
271 p
PDF (2.4 MB)
Turner, David C.
751 Nominal domain theory for concurrency David C. Turner 2009-07 PhD
185 p
PDF (1.3 MB)
Turner, Martin John
344 The contour tree image encoding technique and file format Martin John Turner 1994-07 PhD
154 p
Twigg, Andrew D.
678 Compact forbidden-set routing Andrew D. Twigg 2006-12 PhD
115 p
PDF (1.1 MB)
Uhlig, Steve
725 Beyond node degree: evaluating AS topology models Hamed Haddadi, Damien Fay, et al. 2008-07 16 p PDF (1.0 MB)
729 Weighted spectral distribution Damien Fay, Hamed Haddadi, et al. 2008-09 13 p PDF (0.2 MB)
756 Analysis of the Internet’s structural evolution Hamed Haddadi, Damien Fay, et al. 2009-09 13 p PDF (0.3 MB)
Unyapoth, Asis
514 Nomadic π-calculi: Expressing and verifying communication infrastructure for mobile computation Asis Unyapoth 2001-06 PhD
316 p
PDF (1.3 MB)
PS (0.7 MB)
Upton, Eben
609 Using camera-phones to interact with context-aware mobile services Eleanor Toye, Anil Madhavapeddy, et al. 2004-12 23 p PDF (0.4 MB)
680 Haggle: Clean-slate networking for mobile devices Jing Su, James Scott, et al. 2007-01 30 p PDF (0.5 MB)
Urma, Raoul-Gabriel
902 Programming language evolution Raoul-Gabriel Urma 2017-02 PhD
129 p
PDF (2.0 MB)
Vafeiadis, Viktor
605 Acute: High-level programming language design for distributed computation : Design rationale and language definition Peter Sewell, James J. Leifer, et al. 2004-10 193 p PDF (1.2 MB)
659 A safety proof of a lazy concurrent list-based set implementation Viktor Vafeiadis, Maurice Herlihy, et al. 2006-01 19 p PDF (0.2 MB)
687 A marriage of rely/guarantee and separation logic Viktor Vafeiadis, Matthew Parkinson 2007-06 31 p PDF (0.4 MB)
726 Modular fine-grained concurrency verification Viktor Vafeiadis 2008-07 PhD
148 p
PDF (1.2 MB)
736 Deny-guarantee reasoning Mike Dodds, Xinyu Feng, et al. 2009-01 82 p PDF (0.6 MB)
777 Concurrent Abstract Predicates Thomas Dinsdale-Young, Mike Dodds, et al. 2010-04 43 p PDF (0.5 MB)
778 Automatically proving linearizability Viktor Vafeiadis 2016-09 19 p PDF (0.4 MB)
Valla, Emma
912 Network traffic classification via neural networks Ang Kun Joo Michael, Emma Valla, et al. 2017-09 25 p to appear
van der Merwe, Jacobus Erasmus
450 Open service support for ATM Jacobus Erasmus van der Merwe 1998-11 PhD
164 p
VanInwegen, Myra
485 Three notes on the interpretation of Verilog Daryl Stewart, Myra VanInwegen 2000-01 47 p
Van Tassell, John Peter
196 The semantics of VHDL with Val and Hol: towards practical verification tools John Peter Van Tassell 1990-06 77 p
199 The HOL verification of ELLA designs Richard Boulton, Mike Gordon, et al. 1990-08 22 p PS (0.1 MB)
249 A formalisation of the VHDL simulation cycle John P. Van Tassel 1992-03 24 p PDF (1.2 MB)
317 Femto-VHDL: the semantics of a subset of VHDL and its embedding in the HOL proof assistant John Peter Van Tassel 1993-11 PhD
122 p
Vardi, Moshe
788 Branching-time reasoning for programs (extended version) Byron Cook, Eric Koskinen, Moshe Vardi 2011-07 38 p PDF (0.9 MB)
Vertanen, Keith
627 Efficient computer interfaces using continuous gestures, language models, and speech Keith Vertanen 2005-03 MPhil
46 p
PDF (0.6 MB)
Vidales, Pablo
656 Seamless mobility in 4G systems Pablo Vidales 2005-11 PhD
141 p
PDF (1.8 MB)
Villavicencio, Aline
533 The acquisition of a unification-based generalised categorial grammar Aline Villavicencio 2002-04 PhD
223 p
PDF (2.2 MB)
Vitek, Jan
463 Secure composition of insecure components Peter Sewell, Jan Vitek 1999-04 44 p PS (0.2 MB)
478 Secure composition of untrusted code: wrappers and causality types Peter Sewell, Jan Vitek 1999-11 36 p PS (0.2 MB)
Vlachos, Andreas
791 Semi-supervised learning for biomedical information extraction Andreas Vlachos 2010-11 PhD
113 p
PDF (1.0 MB)
Vogel, Thomas Ulrich
241 Learning in large state spaces with an application to biped robot walking Thomas Ulrich Vogel 1991-12 PhD
204 p
Voigt, Janina
836 Aliasing contracts: a dynamic approach to alias protection Janina Voigt, Alan Mycroft 2013-06 27 p PDF (0.3 MB)
880 Access contracts: a dynamic approach to object-oriented access protection Janina Voigt 2016-02 PhD
171 p
PDF (1.8 MB)
von Wright, J.
323 Representing higher-order logic proofs in HOL J. von Wright 1994-01 28 p
324 Verifying modular programs in HOL J. von Wright 1994-01 25 p
Vos, Tanja
487 Sequential program composition in UNITY Tanja Vos, Doaitse Swierstra 2000-03 20 p
Vuković, Maja
700 Context aware service composition Maja Vuković 2007-10 PhD
225 p
PDF (1.7 MB)
Wagner, Kim Ritter
371 LIMINF convergence in Ω-categories Kim Ritter Wagner 1995-06 28 p
Walker, S.
446 A probabilistic model of information and retrieval: development and status K. Spärck Jones, S. Walker, S.E. Robertson 1998-08 74 p PS (0.2 MB)
DVI (0.1 MB)
Wang, Heng
235 Modelling and image generation Heng Wang PhD
145 p
Wang, Xiaodong
695 Efficient maximum-likelihood decoding of spherical lattice codes Karen Su, Inaki Berenguer, et al. 2007-07 29 p PDF (0.4 MB)
Wansbrough, Keith
515 The UDP calculus: rigorous semantics for real networking Andrei Serjantov, Peter Sewell, Keith Wansbrough 2001-07 70 p PS (0.3 MB)
568 Dynamic rebinding for marshalling and update, with destruct-time λ Gavin Bierman, Michael Hicks, et al. 2004-02 85 p PDF (0.7 MB)
569 Global abstraction-safe marshalling with hash types James J. Leifer, Gilles Peskine, et al. 2003-06 86 p PDF (0.8 MB)
605 Acute: High-level programming language design for distributed computation : Design rationale and language definition Peter Sewell, James J. Leifer, et al. 2004-10 193 p PDF (1.2 MB)
623 Simple polymorphic usage analysis Keith Wansbrough 2005-03 PhD
364 p
PDF (3.1 MB)
624 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 1: Overview Steve Bishop, Matthew Fairbairn, et al. 2005-03 88 p PDF (1.3 MB)
625 TCP, UDP, and Sockets: rigorous and experimentally-validated behavioural specification : Volume 2: The Specification Steve Bishop, Matthew Fairbairn, et al. 2005-03 386 p PDF (2.5 MB)
Want, Roy
141 Reliable management of voice in a distributed system Roy Want 1988-07 PhD
127 p
PDF (7.6 MB)
Warfield, Andrew K.
553 Xen 2002 Paul R. Barham, Boris Dragovic, et al. 2003-01 15 p PDF (0.2 MB)
596 Reconstructing I/O Keir Fraser, Steven Hand, et al. 2004-08 16 p PDF (0.3 MB)
Wassell, Ian J.
695 Efficient maximum-likelihood decoding of spherical lattice codes Karen Su, Inaki Berenguer, et al. 2007-07 29 p PDF (0.4 MB)
727 A novel auto-calibration system for wireless sensor motes Ruoshui Liu, Ian J. Wassell 2008-09 65 p PDF (5.5 MB)
Watcharawitch, Panit
588 MulTEP: A MultiThreaded Embedded Processor Panit Watcharawitch 2004-05 PhD
190 p
PDF (3.6 MB)
Watson, Rebecca F.
743 Optimising the speed and accuracy of a Statistical GLR Parser Rebecca F. Watson 2009-03 PhD
145 p
PDF (1.4 MB)
Watson, Robert N. M.
818 New approaches to operating system security extensibility Robert N. M. Watson 2012-04 PhD
184 p
PDF (1.2 MB)
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
851 Capability Hardware Enhanced RISC Instructions: CHERI User’s guide Robert N.M. Watson, David Chisnall, et al. 2014-04 26 p PDF (0.4 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
853 Bluespec Extensible RISC Implementation: BERI Software reference Robert N.M. Watson, David Chisnall, et al. 2014-04 34 p PDF (0.9 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
869 Bluespec Extensible RISC Implementation: BERI Software reference Robert N. M. Watson, David Chisnall, et al. 2015-04 27 p PDF (0.9 MB)
873 Clean application compartmentalization with SOAAP (extended version) Khilan Gudka, Robert N.M. Watson, et al. 2015-08 35 p PDF (2.1 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
877 Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide Robert N. M. Watson, David Chisnall, et al. 2015-09 58 p PDF (0.4 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
916 Capability Hardware Enhanced RISC Instructions (CHERI): Notes on the Meltdown and Spectre Attacks Robert N. M. Watson, Jonathan Woodruff, et al. 2018-02 16 p PDF (0.2 MB)
924 OpenDTrace Specification version 1.0 George Neville-Neil, Jonathan Anderson, et al. 2018-08 235 p PDF (0.9 MB)
Weaver, Nicholas
703 Lazy Susan: dumb waiting as proof of work Jon Crowcroft, Tim Deegan, et al. 2007-11 23 p PDF (0.3 MB)
Wellner, Pierre David
330 Interacting with paper on the DigitalDesk Pierre David Wellner 1994-03 PhD
96 p
PDF (3.8 MB)
Wenzel, Markus
449 Locales : A sectioning concept for Isabelle Florian Kammüller, Markus Wenzel 1998-10 16 p
Wheeler, David J.
120 Block encryption D. Wheeler 1987-11 4 p PDF (0.4 MB)
164 A matrix key distribution system Li Gong, David J. Wheeler 1988-10 20 p PDF (1.0 MB)
355 Two cryptographic notes David Wheeler, Roger Needham 1994-11 6 p PDF (0.4 MB)
445 Secure sessions from weak secrets Michael Roe, Bruce Christianson, David Wheeler 1998-07 12 p PDF (1.0 MB)
Wickerson, John
774 Explicit stabilisation for modular rely-guarantee reasoning John Wickerson, Mike Dodds, Matthew Parkinson 2010-03 29 p PDF (0.9 MB)
834 Concurrent verification for sequential programs John Wickerson 2013-05 PhD
149 p
PDF (1.6 MB)
Wilcox, Stephen Paul
468 Synthesis of asynchronous circuits Stephen Paul Wilcox 1999-07 PhD
250 p
PDF (1.7 MB)
Wilkes, Andrew John
108 Workstation design for distributed computing Andrew John Wilkes 1987-06 PhD
179 p
PDF (7.2 MB)
Wilkes, John
30 A portable BCPL library John Wilkes 1982-10 31 p PDF (2.2 MB)
Williamson, Mark
596 Reconstructing I/O Keir Fraser, Steven Hand, et al. 2004-08 16 p PDF (0.3 MB)
Wilson, Ian David
15 The implementation of BCPL on a Z80 based microcomputer I.D. Wilson 68 p PDF (2.4 MB)
83 Operation system design for large personal workstations Ian David Wilson PhD
203 p
Wilson, Lee
760 Radical innovation: crossing knowledge boundaries with interdisciplinary teams Alan F. Blackwell, Lee Wilson, et al. 2009-11 124 p PDF (0.7 MB)
Wilson, Paul
754 Understanding scam victims: seven principles for systems security Frank Stajano, Paul Wilson 2009-08 22 p PDF (0.3 MB)
Winskel, Glynn
51 Using information systems to solve recursive domain equations effectively Glynn Winskel, Kim Guldstrand Larsen 1984-07 41 p PDF (2.9 MB)
58 Categories of models for concurrency Glynn Winskel 1984-10 35 p PDF (1.3 MB)
59 On the composition and decomposition of assertions Glynn Winskel 1984-11 35 p PDF (1.1 MB)
78 A complete proof system for SCCS with model assertions Glynn Winskel 23 p
79 Petri nets, algebras and morphisms Glynn Winskel 38 p PDF (2.1 MB)
85 Category theory and models for parallel computation Glynn Winskel 1986-04 16 p PDF (1.0 MB)
95 Event structures : Lecture notes for the Advanced Course on Petri Nets Glynn Winskel 1986-07 69 p PDF (4.0 MB)
96 Models and logic of MOS circuits : Lectures for the Marktoberdorf Summerschool, August 1986 Glynn Winskel 1986-10 47 p
105 A compositional model of MOS circuits Glynn Winskel 1987-04 25 p
107 DI-domains as a model of polymorphism Thierry Coquand, Carl Gunter, Glynn Winskel 1987-05 19 p
110 Relating two models of hardware Glynn Winskel 1987-07 16 p
116 Domain theoretic models of polymorphism Thierry Coquand, Carl Gunter, Glynn Winskel 1987-09 52 p
477 Presheaf models for CCS-like languages Gian Luca Cattani, Glynn Winskel 1999-11 46 p
589 new-HOPLA — a higher-order process language with name generation Glynn Winskel, Francesco Zappa Nardelli 2004-05 16 p PDF (0.3 MB)
Wojciechowski, Paweł Tomasz
462 Location-independent communication for mobile agents: a two-level architecture Peter Sewell, Paweł T. Wojciechowski, Benjamin C. Pierce 1999-04 31 p PS (0.1 MB)
492 Nomadic Pict: language and infrastructure design for mobile computation Paweł Tomasz Wojciechowski 2000-06 PhD
184 p
PDF (1.0 MB)
PS (0.4 MB)
Wolfram, D.A.
112 Reducing thrashing by adaptive backtracking D.A. Wolfram 1987-08 15 p
Wollner, Patrick K.A.
855 Mephistophone Patrick K.A. Wollner, Isak Herman, et al. 2014-06 8 p PDF (1.1 MB)
Wong, Ford Long
709 Protocols and technologies for security in pervasive computing and communications Ford Long Wong 2008-01 PhD
167 p
PDF (1.8 MB)
Wong, Starsky H.Y.
708 IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks Chi-Kin Chau, Jon Crowcroft, et al. 2008-01 24 p PDF (0.3 MB)
Wong, Wai
300 Formal verification of VIPER’s ALU Wai Wong 1993-04 78 p
306 Recording HOL proofs Wai Wong 1993-07 57 p
389 A proof checked for HOL Wai Wong 1996-03 165 p
Woodland, P.C.
517 The Cambridge Multimedia Document Retrieval Project: summary of experiments Karen Spärck Jones, P. Jourlin, et al. 2001-07 30 p PS (0.1 MB)
DVI (0.0 MB)
Woodman, Oliver J.
696 An introduction to inertial navigation Oliver J. Woodman 2007-08 37 p PDF (0.9 MB)
Woodruff, Jonathan D.
850 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N.M. Watson, Peter G. Neumann, et al. 2014-04 131 p PDF (0.7 MB)
851 Capability Hardware Enhanced RISC Instructions: CHERI User’s guide Robert N.M. Watson, David Chisnall, et al. 2014-04 26 p PDF (0.4 MB)
852 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N.M. Watson, Jonathan Woodruff, et al. 2014-04 76 p PDF (0.5 MB)
853 Bluespec Extensible RISC Implementation: BERI Software reference Robert N.M. Watson, David Chisnall, et al. 2014-04 34 p PDF (0.9 MB)
858 CHERI: A RISC capability machine for practical memory safety Jonathan D. Woodruff 2014-07 PhD
112 p
PDF (1.1 MB)
864 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture Robert N. M. Watson, Peter G. Neumann, et al. 2014-12 142 p PDF (0.7 MB)
868 Bluespec Extensible RISC Implementation: BERI Hardware reference Robert N. M. Watson, Jonathan Woodruff, et al. 2015-04 82 p PDF (0.5 MB)
869 Bluespec Extensible RISC Implementation: BERI Software reference Robert N. M. Watson, David Chisnall, et al. 2015-04 27 p PDF (0.9 MB)
876 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, et al. 2015-09 198 p PDF (0.9 MB)
877 Capability Hardware Enhanced RISC Instructions: CHERI Programmer’s Guide Robert N. M. Watson, David Chisnall, et al. 2015-09 58 p PDF (0.4 MB)
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
916 Capability Hardware Enhanced RISC Instructions (CHERI): Notes on the Meltdown and Spectre Attacks Robert N. M. Watson, Jonathan Woodruff, et al. 2018-02 16 p PDF (0.2 MB)
Wördenweber, Burkard
18 Automatic mesh generation of 2 & 3 dimensional curvilinear manifolds Burkard Wördenweber 1981-11 PhD
128 p
Wray, Stuart Charles
92 Implementation and programming techniques for functional languages Stuart Charles Wray 1986-06 PhD
117 p
Wren, Alisdair
642 First-class relationships in an object-oriented language Gavin Bierman, Alisdair Wren 2005-08 53 p PDF (0.5 MB)
702 Relationships for object-oriented programming languages Alisdair Wren 2007-11 PhD
153 p
PDF (1.2 MB)
Wrench, K.L.
212 A distributed and-or parallel Prolog network K.L. Wrench 82 p
Wu, Yongdong
518 An attack on a traitor tracing scheme Jeff Jianxin Yan, Yongdong Wu 2001-07 14 p PDF (0.2 MB)
Wu, Zhixue
294 OPERA : Storage, programming and display of multimedia objects Ken Moody, Jean Bacon, et al. 1993-04 9 p
296 A persistent programming language for multimedia databases in the OPERA project Z. Wu, K. Moody, J. Bacon 1993-04 9 p
301 The dual-level validation concurrency control method Zhixue Wu, Ken Moody, Jean Bacon 1993-06 24 p
338 A new approach to implementing atomic data types Zhixue Wu 1994-05 PhD
170 p
Wyvill, B.
541 Different applications of two-dimensional potential fields for volume modeling L. Barthe, N.A. Dodgson, et al. 2002-08 26 p PDF (1.9 MB)
Xia, Hongyan
891 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 5) Robert N. M. Watson, Peter G. Neumann, et al. 2016-06 242 p PDF (1.1 MB)
907 Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 6) Robert N. M. Watson, Peter G. Neumann, et al. 2017-04 307 p PDF (9.4 MB)
Xu, Na
737 Static contract checking for Haskell Na Xu 2008-12 PhD
175 p
PDF (1.0 MB)
Yahalom, Raphael
231 Managing the order of transactions in widely-distributed data systems Raphael Yahalom 1991-08 PhD
133 p
Yan, Jeff Jianxin
500 The memorability and security of passwords – some empirical results Jianxin Yan, Alan Blackwell, et al. 2000-09 13 p PDF (0.2 MB)
518 An attack on a traitor tracing scheme Jeff Jianxin Yan, Yongdong Wu 2001-07 14 p PDF (0.2 MB)
Yannakoudakis, Helen
842 Automated assessment of English-learner writing Helen Yannakoudakis 2013-10 PhD
151 p
PDF (1.3 MB)
Yao, Walt
608 Trust management for widely distributed systems Walt Yao 2004-11 PhD
191 p
PDF (1.5 MB)
Yoneki, Eiko
559 Pronto: MobileGateway with publish-subscribe paradigm over wireless network Eiko Yoneki, Jean Bacon 2003-02 22 p PDF (0.5 MB)
677 ECCO: Data centric asynchronous communication Eiko Yoneki 2006-12 PhD
210 p
PDF (6.6 MB)
749 Identifying social communities in complex communications for network efficiency Pan Hui, Eiko Yoneki, et al. 2009-05 14 p PDF (0.7 MB)
767 Ising model of rumour spreading in interacting communities Massimo Ostilli, Eiko Yoneki, et al. 2010-01 24 p PDF (3.2 MB)
806 On joint diagonalisation for dynamic network analysis Damien Fay, Jérôme Kunegis, Eiko Yoneki 2011-10 12 p PDF (0.8 MB)
820 A unified graph query layer for multiple databases Eiko Yoneki, Amitabha Roy 2012-08 22 p PDF (0.3 MB)
823 Mitigating I/O latency in SSD-based graph traversal Amitabha Roy, Karthik Nilakant, et al. 2012-11 27 p PDF (0.3 MB)
866 PDTL: Parallel and distributed triangle listing for massive graphs Ilias Giechaskiel, George Panagopoulos, Eiko Yoneki 2015-04 14 p PDF (0.5 MB)
881 Web data knowledge extraction Juan M. Tirado, Ovidiu Serban, et al. 2016-03 60 p PDF (0.7 MB)
Young, R.M.
214 Integrating knowledge of purpose and knowledge of structure for design evaluation J.A. Bradshaw, R.M. Young 1991-02 20 p
Young, S.J.
335 Video mail retrieval using voice: report on keyword definition and data collection (deliverable report on VMR task No. 1) G.J.F. Jones, J.T. Foote, et al. 1994-04 38 p PDF (1.7 MB)
366 Retrieving spoken documents: VMR Project experiments K. Spärck Jones, G.J.F. Jones, et al. 1995-05 28 p
402 Video mail retrieval using voice: report on collection of naturalistic requests and relevance assessments G.J.F. Jones, J.T. Foote, et al. 1996-09 21 p
430 Video mail retrieval using voice : Report on topic spotting G.J.F. Jones, J.T. Foote, et al. 1997-07 73 p
Youn, Paul
644 Robbing the bank with a theorem prover Paul Youn, Ben Adida, et al. 2005-08 26 p PDF (0.2 MB)
Yuan, Zheng
904 Grammatical error correction in non-native English Zheng Yuan 2017-03 PhD
145 p
PDF (1.4 MB)
Yu, Dongting
898 Access control for network management Dongting Yu 2017-01 PhD
108 p
PDF (0.8 MB)
Zadnik, Martin
750 AtoZ: an automatic traffic organizer using NetFPGA Marco Canini, Wei Li, et al. 2009-05 27 p PDF (0.8 MB)
Zaidi, Ali Mustafa
870 Accelerating control-flow intensive code in spatial hardware Ali Mustafa Zaidi 2015-05 PhD
170 p
PDF (6.3 MB)
Zhang, Guo Qiang
185 Logics of Domains Guo Qiang Zhang 1989-12 PhD
250 p
Zhang, Hongke
747 An estimator of forward and backward delay for multipath transport Fei Song, Hongke Zhang, et al. 2009-03 16 p PDF (0.8 MB)
Zhang, Sidong
747 An estimator of forward and backward delay for multipath transport Fei Song, Hongke Zhang, et al. 2009-03 16 p PDF (0.8 MB)
Zhao, Qinping
755 Skin-detached surface for interactive large mesh editing Yujian Gao, Aimin Hao, et al. 2009-09 18 p PDF (1.1 MB)
Zieliński, Piotr
560 Decimalisation table attacks for PIN cracking Mike Bond, Piotr Zieliński 2003-02 14 p PDF (0.2 MB)
582 Latency-optimal Uniform Atomic Broadcast algorithm Piotr Zieliński 2004-02 28 p PDF (0.3 MB)
593 Paxos at war Piotr Zieliński 2004-06 30 p PDF (0.3 MB)
638 Optimistic Generic Broadcast Piotr Zieliński 2005-07 22 p PDF (0.3 MB)
667 Minimizing latency of agreement protocols Piotr Zieliński 2006-06 PhD
239 p
PDF (2.0 MB)
668 Optimistically Terminating Consensus Piotr Zieliński 2006-06 35 p PDF (0.4 MB)
671 Low-latency Atomic Broadcast in the presence of contention Piotr Zieliński 2006-07 23 p PDF (0.3 MB)
681 Indirect channels: a bandwidth-saving technique for fault-tolerant protocols Piotr Zieliński 2007-04 24 p PDF (0.3 MB)
693 Automatic classification of eventual failure detectors Piotr Zieliński 2007-07 21 p PDF (0.3 MB)
694 Anti-Ω: the weakest failure detector for set agreement Piotr Zieliński 2007-07 24 p PDF (0.3 MB)
Zilberman, Noa
914 Characterizing the impact of network latency on cloud-based applications’ performance Diana Andreea Popescu, Noa Zilberman, Andrew W. Moore 2017-11 20 p PDF (0.8 MB)