Now showing items 1-20 of 21

    • A calculus for costed computations 

      HENNESSY, MATTHEW (2011)
      We develop a version of the picalculus Picost where channels are interpreted as resources which have costs associated with them. Code runs under the financial responsibility of owners; they must pay to use resources, but ...
    • Compositional Reasoning for Markov Decision Processes 

      HENNESSY, MATTHEW (2011)
      Markov decision processes (MDPs) have long been used to model qualitative aspects of systems in the presence of uncertainty. However, much of the literature on MDPs takes a monolithic approach, by modelling a system as a ...
    • Extending a Knowledge-based Network to support Temporal Event Reasoning 

      O'SULLIVAN, DECLAN; KEENEY, JOHN (IEEE, 2010)
      While the polling or request/response paradigm adopted by many network and systems management approaches form the backbone of modern monitoring and management systems, the most important and interesting events, faults, ...
    • Federated homes: Secure sharing of home services 

      O'SULLIVAN, DECLAN; KEENEY, JOHN; FEENEY, KEVIN CHEKOV; ETZIONI, ZOHAR (IEEE, 2011)
      This paper presents an architecture which allows consumers to securely share the services available in their home networks with remote third parties. It is implemented as a software service which can be installed on a ...
    • First-Order Reasoning for Higher-Order Concurrency 

      HENNESSY, MATTHEW (2009)
      By combining and simplifying two of the most prominent theories for HO! of Sangiorgi et al. and Jeffrey and Rathke [15, 4], we present an effective first-order theory for a higher-order picalculus. There are two significant ...
    • The future of enterprise groupware applications 

      WADE, VINCENT PATRICK (Springer, 2000)
      We are currently witnessing a convergence of several threads of technology and business imperatives. A new model for business organisations, the Virtual Enterprise (VE) is emerging. The new model is based on the idea ...
    • Leaky or Guessable Session Identifiers 

      FARRELL, STEPHEN (IEEE, 2011)
      Many Internet and Web applications use session identifiers. Too often, developers of those applications make the bad assumption that all is well because session identifiers are only known to authorized users. However, in ...
    • Model-driven engineering of planning and optimisation algorithms for pervasive computing environments 

      CAHILL, VINNY (2011)
      This paper presents a model-driven approach to developing pervasive computing applications that exploits design-time information to support the engineering of planning and optimisation algorithms that reflect the presence ...
    • Opportunistic Detection of Relative Mobility in Wireless Sensor Networks 

      MCGOLDRICK, CIARAN; HUGGARD, MERIEL (IEEE, 2010)
      In highly mobile ad hoc networks the neighbourhood status evolves rapidly. Routing tables which are populated with an ?out of date? view of the neighbourhood produce an overhead in the routing process which can affect ...
    • Optimizing interpreters by tuning opcode orderings on virtual machines for modern architectures 

      GREGG, DAVID; MCCANDLESS, JASON MARSHALL (ACM, 2011)
      Virtual machines (VMs) are commonly used to implement programming languages such as Java, Python and Lua. VMs are typically implemented using an interpreter, a JIT compiler, or some combination of the two. A long-standing ...
    • Patient-Centred Laboratory Validation Using Software Agents 

      GRIMSON, JANE BARCLAY (2008)
      Guidelines are self-contained documents which healthcare professionals reference to obtain knowledge about a specific condition or process. They interface with these documents and apply known facts about specific patients ...
    • A practical solution for achieving language compatibility in scripting language compilers 

      GREGG, DAVID; DE VRIES, EDSKO; BIGGAR, PAUL (2012)
      Although scripting languages have become very popular, even mature scripting language implementations remain interpreted. Several compilers and reimplementations have been attempted, generally focusing on performance. Based ...
    • Process Behaviour: Formulae vs. Tests 

      HENNESSY, MATTHEW (2010)
      Process behaviour is often defined either in terms of the tests they satisfy, or in terms of the logical properties they enjoy. Here we compare these two approaches, using extensional testing in the style of DeNicola, ...
    • Real Reward Testing for Probabilistic Processes 

      HENNESSY, MATTHEW (2011)
      We introduce a notion of real reward testing for probabilistic processes by extending the traditional nonnegative reward testing with negative rewards. In this testing framework, the may and must preorders turn out to ...
    • Report on an Arctic summer DTN trial 

      FARRELL, STEPHEN; MCMAHON, ALEX MARK (Springer, 2011)
      Delay- and disruption-tolerant networking (DTN) is an emerging area of networking research that will benefit from real-world trials and testbeds. We describe a week long DTN trial carried out during the summer of 2009 in ...
    • Software Agents Representing Medical Guidelines. 

      GRIMSON, JANE BARCLAY (2008)
      Guidelines are self-contained documents which healthcare professionals reference to obtain specific disease or medical condition knowledge for a particular population cohort. They view these documents and apply known ...
    • Testing Finitary Probabilistic Processes 

      HENNESSY, MATTHEW (2009)
      This paper provides modal- and relational characterisations of may- and must-testing preorders for recursive CSP processes with divergence, featuring probabilistic as well as nondeterministic choice. May testing is ...
    • A Testing Theory for a Higher-Order Cryptographic Language 

      HENNESSY, MATTHEW (2011)
      We study a higher-order concurrent language with cryptographic primitives, for which we develop a sound and complete, rstorder testing theory for the preservation of safety properties. Our theory is based on co-inductive ...
    • Uniqueness Typing for Resource Management in Message-Passing Concurrency. 

      HENNESSY, MATTHEW (2010)
      We view channels as the main form of resources in a message-passing programming paradigm. These channels need to be carefully managed in settings where resources are scarce. To study this problem, we extend the pi-calculus ...
    • What makes a great mobile digital art exhibition 

      STRONG, GLENN; BRADY, MICHAEL HAYES; GILTRAP, CATHERINE; MAC an AIRCHINNIGH, MICHEAL (Hacettepe University Department of Information Management, 2011)
      Passive reception and consumption of art is a given, in our times. Artists produce. Spectators consume. At the nexus stands the curator who chooses the produce and the exhibitor who provides the space for consumers. This ...