Search Results for author: James Cheney

Found 9 papers, 5 papers with code

A Rule Mining-Based Advanced Persistent Threats Detection System

1 code implementation20 May 2021 Sidahmed Benabderrahmane, Ghita Berrada, James Cheney, Petko Valtchev

Advanced persistent threats (APT) are stealthy cyber-attacks that are aimed at stealing valuable information from target organizations and tend to extend in time.

Blocking

Data provenance, curation and quality in metrology

no code implementations16 Feb 2021 James Cheney, Adriane Chapman, Joy Davidson, Alistair Forbes

Data metrology -- the assessment of the quality of data -- particularly in scientific and industrial settings, has emerged as an important requirement for the UK National Physical Laboratory (NPL) and other national metrology institutes.

Databases

Query Lifting: Language-integrated query for heterogeneous nested collections

no code implementations11 Jan 2021 Wilmer Ricciotti, James Cheney

Language-integrated query based on comprehension syntax is a powerful technique for safe database programming, and provides a basis for advanced techniques such as query shredding or query flattening that allow efficient programming with complex nested collections.

Programming Languages Databases

Categorical anomaly detection in heterogeneous data using minimum description length clustering

no code implementations14 Jun 2020 James Cheney, Xavier Gombau, Ghita Berrada, Sidahmed Benabderrahmane

Fast and effective unsupervised anomaly detection algorithms have been proposed for categorical data based on the minimum description length (MDL) principle.

Clustering Unsupervised Anomaly Detection

A Polymorphic RPC Calculus

1 code implementation24 Oct 2019 Kwanghoon Choi, James Cheney, Simon Fowler, Sam Lindley

The RPC calculus is a simple semantic foundation for multi-tier programming languages such as Links in which located functions can be written for the client-server model.

Programming Languages

Towards meta-interpretive learning of programming language semantics

1 code implementation20 Jul 2019 Sándor Bartha, James Cheney

We introduce a new application for inductive logic programming: learning the semantics of programming languages from example evaluations.

Inductive logic programming

A baseline for unsupervised advanced persistent threat detection in system-level provenance

1 code implementation17 Jun 2019 Ghita Berrada, Sidahmed Benabderrahmane, James Cheney, William Maxwell, Himan Mookherjee, Alec Theriault, Ryan Wright

Advanced persistent threats (APT) are stealthy, sophisticated, and unpredictable cyberattacks that can steal intellectual property, damage critical infrastructure, or cause millions of dollars in damage.

Cryptography and Security

Imperative Functional Programs that Explain their Work

2 code implementations22 May 2017 Wilmer Ricciotti, Jan Stolarek, Roly Perera, James Cheney

Program slicing provides explanations that illustrate how program outputs were produced from inputs.

Programming Languages

A Core Calculus for Provenance

no code implementations23 Oct 2013 Umut A. Acar, Amal Ahmed, James Cheney, Roly Perera

It is proposed that many computer systems will need to become provenance-aware in order to provide satisfactory accountability, reproducibility, and trust for scientific or other high-value data.

Programming Languages

Cannot find the paper you are looking for? You can Submit a new open access paper.