Browsing by Title
Now showing items 3718-3737 of 4790
-
Sea-ice thermodynamics and brine drainage
(Royal Society PublishingPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2015-07-13)Significant changes in the state of the Arctic ice cover are occurring. As the summertime extent of sea ice diminishes, the Arctic is increasingly characterized by first-year rather than multi-year ice. It is during the ...
-
Second-generation high-temperature superconducting coils and their applications for energy storage
(University of CambridgeDepartment of Engineering, 2010-11-16)Since a superconductor has no resistance below a certain temperature and can therefore save a large amount of energy dissipated, it is a 'green' material by saving energy loss and hence reducing carbon emissions. Recently ...
-
Second-order algebraic theories
(University of CambridgeFaculty of Computer Science and Technology, 2011-11-08)Second-order universal algebra and second-order equational logic respectively provide a model theory and a formal deductive system for languages with variable binding and parameterised metavariables. This work completes ...
-
Second-Order Asymptotics of Visible Mixed Quantum Source Coding via Universal Codes
(IEEEIEEE Transactions on Information Theory, 2016-05-23)The simplest example of a quantum information source with memory is a mixed source, which emits signals entirely from one of two memoryless quantum sources with given $\textit{a priori}$ probabilities. Considering a mixed ...
-
Secondary instability and tertiary states in rotating plane Couette flow
(Cambridge University PressJournal of Fluid Mechanics, 2014-11-14)Recent experimental studies have shown rich transition behaviour in rotating plane Couette ow (RPCF). In this paper we study the transition in supercritical RPCF theoretically by determination of equilibrium and periodic ...
-
Secondary Storage in LISP
(1963-12-01)A principal limitation of LISP processors in many computations is that of inadequate primary random-access storage. This paper explores several methods of using a secondary storage medum (such as drums, disk files or magetic ...
-
Secondary Structure Prediction of All-Helical Proteins Using Hidden Markov Support Vector Machines
(2005-10-06)Our goal is to develop a state-of-the-art predictor with an intuitive and biophysically-motivated energy model through the use of Hidden Markov Support Vector Machines (HM-SVMs), a recent innovation in the field of machine ...
-
Secular evolution of eccentricity in protoplanetary discs with gap-opening planets
(Oxford University PressMonthly Notices of the Royal Astronomical Society, 2017-06)We explore the evolution of the eccentricity of an accretion disc perturbed by an embedded planet whose mass is sufficient to open a large gap in the disc. Various methods for representing the orbit-averaged motion of an ...
-
Secure Program Execution Via Dynamic Information Flow Tracking
(2003-07-21)We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ...
-
Secure quantum signatures using insecure quantum channels
(American Physical SocietyPhysical Review A, 2016-03-17)Digital signatures are widely used in modern communication to guarantee authenticity and transferability of messages. The security of currently used classical schemes relies on computational assumptions. We present a quantum ...
-
Securing Deployed RFIDs by Randomizing the Modulation and the Channel
(2013-01-12)RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate ...
-
Security and Modularity in Message Passing
(MIT Artificial Intelligence Laboratory, 1979-02)This paper addresses theoretical issues involved for the implementation of security and modularity in concurrent systems. It explicates the theory behind a mechanism for safely delegating messages to shared handlers in ...
-
A Security Kernel Based on the Lambda-Calculus
(1996-03-13)Cooperation between independent agents depends upon establishing adegree of security. Each of the cooperating agents needs assurance that the cooperation will not endanger resources of value to that agent. In a computer ...
-
SEEC: A Framework for Self-aware Computing
(2010-10-13)As the complexity of computing systems increases, application programmers must be experts in their application domain and have the systems knowledge required to address the problems that arise from parallelism, power, ...
-
SEEC: A Framework for Self-aware Management of Multicore Resources
(2011-03-24)This paper presents SEEC, a self-aware programming model, designed to reduce programming effort in modern multicore systems. In the SEEC model, application programmers specify application goals and progress, while systems ...
-
SEEC: A General and Extensible Framework for Self-Aware Computing
(2011-11-07)Modern systems require applications to balance competing goals, e.g. achieving high performance and low power. Achieving this balance places an unrealistic burden on application programmers who must understand the power ...
-
Seeing 'Ghost' Solutions in Stereo Vision
(1988-09-01)A unique matching is a stated objective of most computational theories of stereo vision. This report describes situations where humans perceive a small number of surfaces carried by non-unique matching of random dot ...
-
Seeing What Your Programs Are Doing
(1982-02-01)An important skill in programming is being able to visualize the operation of procedures, both for constructing programs and debugging them. Tinker is a programming environment for Lisp that enables the programmer to ...
-
Segmentation and Alignment of Speech and Sketching in a Design Environment
(2003-02-01)Sketches are commonly used in the early stages of design. Our previous system allows users to sketch mechanical systems that the computer interprets. However, some parts of the mechanical system might be too hard or too ...
-
Segmentation of Brain Tissue from Magnetic Resonance Images
(1995-01-01)Segmentation of medical imagery is a challenging problem due to the complexity of the images, as well as to the absence of models of the anatomy that fully capture the possible deformations in each structure. Brain ...