1 code implementation • 20 May 2021 • Sidahmed Benabderrahmane, Ghita Berrada, James Cheney, Petko Valtchev
Advanced persistent threats (APT) are stealthy cyber-attacks that are aimed at stealing valuable information from target organizations and tend to extend in time.
no code implementations • 16 Feb 2021 • James Cheney, Adriane Chapman, Joy Davidson, Alistair Forbes
Data metrology -- the assessment of the quality of data -- particularly in scientific and industrial settings, has emerged as an important requirement for the UK National Physical Laboratory (NPL) and other national metrology institutes.
Databases
no code implementations • 11 Jan 2021 • Wilmer Ricciotti, James Cheney
Language-integrated query based on comprehension syntax is a powerful technique for safe database programming, and provides a basis for advanced techniques such as query shredding or query flattening that allow efficient programming with complex nested collections.
Programming Languages Databases
no code implementations • 14 Jun 2020 • James Cheney, Xavier Gombau, Ghita Berrada, Sidahmed Benabderrahmane
Fast and effective unsupervised anomaly detection algorithms have been proposed for categorical data based on the minimum description length (MDL) principle.
1 code implementation • 24 Oct 2019 • Kwanghoon Choi, James Cheney, Simon Fowler, Sam Lindley
The RPC calculus is a simple semantic foundation for multi-tier programming languages such as Links in which located functions can be written for the client-server model.
Programming Languages
1 code implementation • 20 Jul 2019 • Sándor Bartha, James Cheney
We introduce a new application for inductive logic programming: learning the semantics of programming languages from example evaluations.
1 code implementation • 17 Jun 2019 • Ghita Berrada, Sidahmed Benabderrahmane, James Cheney, William Maxwell, Himan Mookherjee, Alec Theriault, Ryan Wright
Advanced persistent threats (APT) are stealthy, sophisticated, and unpredictable cyberattacks that can steal intellectual property, damage critical infrastructure, or cause millions of dollars in damage.
Cryptography and Security
2 code implementations • 22 May 2017 • Wilmer Ricciotti, Jan Stolarek, Roly Perera, James Cheney
Program slicing provides explanations that illustrate how program outputs were produced from inputs.
Programming Languages
no code implementations • 23 Oct 2013 • Umut A. Acar, Amal Ahmed, James Cheney, Roly Perera
It is proposed that many computer systems will need to become provenance-aware in order to provide satisfactory accountability, reproducibility, and trust for scientific or other high-value data.
Programming Languages