Browsing by Title

Now showing items 3718-3737 of 4790

  • Sea-ice thermodynamics and brine drainage 

    Worster, Michael Grae; Rees Jones, DW (Royal Society PublishingPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2015-07-13)
    Significant changes in the state of the Arctic ice cover are occurring. As the summertime extent of sea ice diminishes, the Arctic is increasingly characterized by first-year rather than multi-year ice. It is during the ...

  • Second-generation high-temperature superconducting coils and their applications for energy storage 

    Yuan, Weijia (University of CambridgeDepartment of Engineering, 2010-11-16)
    Since a superconductor has no resistance below a certain temperature and can therefore save a large amount of energy dissipated, it is a 'green' material by saving energy loss and hence reducing carbon emissions. Recently ...

  • Second-order algebraic theories 

    Mahmoud, Ola (University of CambridgeFaculty of Computer Science and Technology, 2011-11-08)
    Second-order universal algebra and second-order equational logic respectively provide a model theory and a formal deductive system for languages with variable binding and parameterised metavariables. This work completes ...

  • Second-Order Asymptotics of Visible Mixed Quantum Source Coding via Universal Codes 

    Leditzky, Felix; Datta, Nilanjana (IEEEIEEE Transactions on Information Theory, 2016-05-23)
    The simplest example of a quantum information source with memory is a mixed source, which emits signals entirely from one of two memoryless quantum sources with given $\textit{a priori}$ probabilities. Considering a mixed ...

  • Secondary instability and tertiary states in rotating plane Couette flow 

    Daly, CA; Schneider, Tobias M; Schlatter, Philipp; Peake, Nigel (Cambridge University PressJournal of Fluid Mechanics, 2014-11-14)
    Recent experimental studies have shown rich transition behaviour in rotating plane Couette ow (RPCF). In this paper we study the transition in supercritical RPCF theoretically by determination of equilibrium and periodic ...

  • Secondary Storage in LISP 

    Unknown author (1963-12-01)
    A principal limitation of LISP processors in many computations is that of inadequate primary random-access storage. This paper explores several methods of using a secondary storage medum (such as drums, disk files or magetic ...

  • Secondary Structure Prediction of All-Helical Proteins Using Hidden Markov Support Vector Machines 

    Unknown author (2005-10-06)
    Our goal is to develop a state-of-the-art predictor with an intuitive and biophysically-motivated energy model through the use of Hidden Markov Support Vector Machines (HM-SVMs), a recent innovation in the field of machine ...

  • Secular evolution of eccentricity in protoplanetary discs with gap-opening planets 

    Teyssandier, Jean Adrien; Ogilvie, Gordon Ian (Oxford University PressMonthly Notices of the Royal Astronomical Society, 2017-06)
    We explore the evolution of the eccentricity of an accretion disc perturbed by an embedded planet whose mass is sufficient to open a large gap in the disc. Various methods for representing the orbit-averaged motion of an ...

  • Secure Program Execution Via Dynamic Information Flow Tracking 

    Unknown author (2003-07-21)
    We present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking ...

  • Secure quantum signatures using insecure quantum channels 

    Amiri, Ryan; Wallden, Petros; Kent, Adrian Patrick; Andersson, Erika (American Physical SocietyPhysical Review A, 2016-03-17)
    Digital signatures are widely used in modern communication to guarantee authenticity and transferability of messages. The security of currently used classical schemes relies on computational assumptions. We present a quantum ...

  • Securing Deployed RFIDs by Randomizing the Modulation and the Channel 

    Unknown author (2013-01-12)
    RFID cards are widely used today in sensitive applications such as access control, payment systems, and asset tracking. Past work shows that an eavesdropper snooping on the communication between a card and its legitimate ...

  • Security and Modularity in Message Passing 

    Unknown author (MIT Artificial Intelligence Laboratory, 1979-02)
    This paper addresses theoretical issues involved for the implementation of security and modularity in concurrent systems. It explicates the theory behind a mechanism for safely delegating messages to shared handlers in ...

  • A Security Kernel Based on the Lambda-Calculus 

    Unknown author (1996-03-13)
    Cooperation between independent agents depends upon establishing adegree of security. Each of the cooperating agents needs assurance that the cooperation will not endanger resources of value to that agent. In a computer ...

  • SEEC: A Framework for Self-aware Computing 

    Unknown author (2010-10-13)
    As the complexity of computing systems increases, application programmers must be experts in their application domain and have the systems knowledge required to address the problems that arise from parallelism, power, ...

  • SEEC: A Framework for Self-aware Management of Multicore Resources 

    Unknown author (2011-03-24)
    This paper presents SEEC, a self-aware programming model, designed to reduce programming effort in modern multicore systems. In the SEEC model, application programmers specify application goals and progress, while systems ...

  • SEEC: A General and Extensible Framework for Self-Aware Computing 

    Unknown author (2011-11-07)
    Modern systems require applications to balance competing goals, e.g. achieving high performance and low power. Achieving this balance places an unrealistic burden on application programmers who must understand the power ...

  • Seeing 'Ghost' Solutions in Stereo Vision 

    Unknown author (1988-09-01)
    A unique matching is a stated objective of most computational theories of stereo vision. This report describes situations where humans perceive a small number of surfaces carried by non-unique matching of random dot ...

  • Seeing What Your Programs Are Doing 

    Unknown author (1982-02-01)
    An important skill in programming is being able to visualize the operation of procedures, both for constructing programs and debugging them. Tinker is a programming environment for Lisp that enables the programmer to ...

  • Segmentation and Alignment of Speech and Sketching in a Design Environment 

    Unknown author (2003-02-01)
    Sketches are commonly used in the early stages of design. Our previous system allows users to sketch mechanical systems that the computer interprets. However, some parts of the mechanical system might be too hard or too ...

  • Segmentation of Brain Tissue from Magnetic Resonance Images 

    Unknown author (1995-01-01)
    Segmentation of medical imagery is a challenging problem due to the complexity of the images, as well as to the absence of models of the anatomy that fully capture the possible deformations in each structure. Brain ...