咨询与建议

限定检索结果

文献类型

  • 94 篇 会议
  • 75 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 173 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 108 篇 计算机科学与技术...
    • 60 篇 软件工程
    • 18 篇 电气工程
    • 15 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 机械工程
    • 3 篇 建筑学
    • 3 篇 安全科学与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 航空宇航科学与技...
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 48 篇 理学
    • 42 篇 数学
    • 7 篇 物理学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
    • 2 篇 系统科学
    • 1 篇 地质学
  • 12 篇 管理学
    • 8 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 公共管理
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 哲学
    • 1 篇 哲学

主题

  • 17 篇 laboratories
  • 8 篇 software enginee...
  • 7 篇 computational mo...
  • 7 篇 hardware
  • 6 篇 concurrent compu...
  • 6 篇 computer archite...
  • 6 篇 functional progr...
  • 5 篇 buildings
  • 5 篇 interference
  • 5 篇 costs
  • 5 篇 semantics
  • 5 篇 algebra
  • 5 篇 delay
  • 4 篇 parallel algorit...
  • 4 篇 discrete event s...
  • 4 篇 program processo...
  • 4 篇 protocols
  • 4 篇 formal specifica...
  • 4 篇 formal methods
  • 4 篇 field programmab...

机构

  • 18 篇 programming rese...
  • 6 篇 oxford universit...
  • 3 篇 programming rese...
  • 3 篇 programming rese...
  • 3 篇 programming rese...
  • 3 篇 programming rese...
  • 3 篇 oxford universit...
  • 3 篇 oxford universit...
  • 3 篇 computing labora...
  • 2 篇 oxford universit...
  • 2 篇 programming rese...
  • 2 篇 german research ...
  • 2 篇 international in...
  • 2 篇 programming rese...
  • 2 篇 programming mode...
  • 2 篇 programming rese...
  • 2 篇 programming rese...
  • 2 篇 oxford universit...
  • 2 篇 institute of nuc...
  • 2 篇 languages and pr...

作者

  • 7 篇 hoare car
  • 5 篇 bowen jonathan
  • 4 篇 w. luk
  • 4 篇 he jf
  • 4 篇 sanders j.w.
  • 4 篇 he jifeng
  • 4 篇 felix wolf
  • 3 篇 edson borin
  • 3 篇 atef hamouda
  • 3 篇 m.y.h. low
  • 3 篇 jifeng he
  • 3 篇 j. e. nicholls
  • 3 篇 wood kenneth r.
  • 2 篇 mauricio bretern...
  • 2 篇 hoare c.a.r.
  • 2 篇 cheng wang
  • 2 篇 sloot p.m.a.
  • 2 篇 amaral josé nels...
  • 2 篇 j. graham-cummin...
  • 2 篇 josephs mark b.

语言

  • 168 篇 英文
  • 5 篇 其他
检索条件"机构=Laboratory of Computing Programming"
173 条 记 录,以下是41-50 订阅
排序:
How to prevent type flaw attacks on security protocols
How to prevent type flaw attacks on security protocols
收藏 引用
作者: Heather, James Lowe, Gavin Schneider, Steve Department of Computing Sch. of Electron. Comp./Mathematics University of Surrey Guildford Surrey GU2 7XH United Kingdom Programming Research Group Computing Laboratory Oxford University Parks Road Oxford OX1 3QD United Kingdom Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX United Kingdom
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number of type flaw attacks have appeared in the... 详细信息
来源: 评论
Lattice boltzmann, A robust and accurate solver for interactive computational hemodynamics
Lattice boltzmann, A robust and accurate solver for interact...
收藏 引用
International Conference on Computational Science, ICCS 2003
作者: Artoli, A.M. Kandhaiy, D. Hoefsloot, H.C.J. Hoekstra, A.G. Sloot, P.M.A. Section Computational Science Laboratory for Computing Systems Architecture and Programming Faculty of Science University of Amsterdam Kruislaan 403 Amsterdam1098 SJ Netherlands Kramers Laboratorium voor Fysische Technologie Faculty of Applied Sciences Delft Netherlands Department of Chemical Engineering Faculty of Science University of Amsterdam Amsterdam Netherlands
Surgical planning as a treatment for vascular diseases re- quires fast blood ow simulations that are eÆcient in handling changing geometry. It is, for example, necessary to try diþerent paths of a planned by... 详细信息
来源: 评论
How to prevent type flaw attacks on security protocols
收藏 引用
Journal of Computer Security 2003年 第2期11卷 217-244页
作者: Heather, James Lowe, Gavin Schneider, Steve Department of Computing School of Electronics Computing and Mathematics University of Surrey Guildford Surrey GU2 7XH UK. E-mail: Programming Research Group Oxford University Computing Laboratory Wolfson Building Parks Road Oxford OX1 3QD UK. E-mail: Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX UK. E-mail:
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number of type flaw attacks have appeared in the...
来源: 评论
Managing external workload with BSP time warp
Managing external workload with BSP time warp
收藏 引用
Proceedings of the 2002 Winter Simulation Conference
作者: Low, Malcolm Yoke Hean Programming Research Group Computing Laboratory University of Oxford Parks Road Oxford OX1 3QD United Kingdom
An extension to the existing bulk synchronous parallel time warp (BSP-TW) dynamic load-balancing algorithms was presented. The algorithm allowed the management to work without interruption from external workload. Expe... 详细信息
来源: 评论
Quantitative program logic and expected time bounds in probabilistic distributed algorithms
Quantitative program logic and expected time bounds in proba...
收藏 引用
Real Time and Probabilistic Systems (ARTS '99)
作者: McIver, A.K. Programming Research Group Oxford University Computing Laboratory Wolfson Building Parks Road Oxford OX1 3QD United Kingdom
In this paper we show how quantitative program logic (Morgan et al., ACM Trans. programming Languages Systems 18 (1996) 325) provides a formal framework in which to promote standard techniques of program analysis to a... 详细信息
来源: 评论
Managing external workload with BSP Time Warp
Managing external workload with BSP Time Warp
收藏 引用
Simulation Winter Conference
作者: M.Y.H. Low Programming Research Group Computing Laboratory University of Oxford Oxford UK
This paper describes an extension to the existing BSP Time Warp (Bulk Synchronous Parallel Time Warp) dynamic load-balancing algorithm to allow the management of interruption from external workload. Experiments carrie... 详细信息
来源: 评论
Dynamic load-balancing for BSP Time Warp
Dynamic load-balancing for BSP Time Warp
收藏 引用
Annual Symposium on Simulation
作者: M.Y.H. Low Programming Research Group Computing Laboratory University of Oxford Oxford UK
The performance of a parallel simulation system depends very much on partitioning simulation workload evenly among the set of processors in the computing environment to ensure load-balance between processors. Most par... 详细信息
来源: 评论
Weakest specifunctions for BSP
收藏 引用
Parallel Processing Letters 2001年 第4期11卷 439-454页
作者: Chen, Yifeng Sanders, J.W. Department of Maths and Computer Science University of Leicester University Road Leicester LE1 7RH United Kingdom Programming Research Group Oxford University Computing Laboratory Parks Road Oxford OX1 3QD United Kingdom
This paper introduces a calculus of weakest specification for supporting reuse of established components in deriving a design (in the sense of formal methods). The weakest specifunction generalizes the notions of weak... 详细信息
来源: 评论
Consistent modeling of distributed mutual exclusion protocol using optimistic simulation  01
Consistent modeling of distributed mutual exclusion protocol...
收藏 引用
Proceedings of the fifteenth workshop on Parallel and distributed simulation
作者: Malcolm Yoke Hean Low David M. Nicol Programming Research Group Computing Laboratory University of Oxford Dept. of Computer Science Dartmouth College
This paper discusses the problem of risk in optimistic simulation protocols, using as example simulation of a distributed mutual exclusion protocol with strong consistency properties. The simulation model is augmented...
来源: 评论
Consistent modeling of distributed mutual exclusion protocol using optimistic simulation
Consistent modeling of distributed mutual exclusion protocol...
收藏 引用
Workshop on Principles of Advanced and Distributed Simulation (PADS)
作者: M.Y.H. Low D.M. Nicol Programming Research Group Computing Laboratory University of Oxford UK Department of Computer Science Dartmouth College USA
This paper discusses the problem of risk in optimistic simulation protocols, using as an example, simulation of a distributed mutual exclusion protocol with strong consistency properties. The simulation model is augme... 详细信息
来源: 评论