Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A new approach to computing optimal schedules for the job-shop scheduling problem

    From a computational point of view, the job-shop scheduling problem is one of the most notoriously intractable NP-hard optimization problems. In spite of a great deal of substantive research, there are instances ...

    Paul Martin, David B. Shmoys in Integer Programming and Combinatorial Optimization (1996)

  2. No Access

    Chapter and Conference Paper

    VerroTouch: High-Frequency Acceleration Feedback for Telerobotic Surgery

    The Intuitive da Vinci system enables surgeons to see and manipulate structures deep within the body via tiny incisions. Though the robotic tools mimic one’s hand motions, surgeons cannot feel what the tools a...

    Katherine J. Kuchenbecker, Jamie Gewirtz in Haptics: Generating and Perceiving Tangibl… (2010)

  3. Chapter and Conference Paper

    Non-invasive Spoofing Attacks for Anti-lock Braking Systems

    This work exposes a largely unexplored vector of physical-layer attacks with demonstrated consequences in automobiles. By modifying the physical environment around analog sensors such as Antilock Braking Syste...

    Yasser Shoukry, Paul Martin, Paulo Tabuada in Cryptographic Hardware and Embedded System… (2013)

  4. Chapter and Conference Paper

    Deadline-Aware Deployment for Time Critical Applications in Clouds

    Time critical applications are appealing to deploy in clouds due to the elasticity of cloud resources and their on-demand nature. However, support for deploying application components with strict deadlines on ...

    Yang Hu, Junchao Wang, Huan Zhou, Paul Martin in Euro-Par 2017: Parallel Processing (2017)

  5. No Access

    Chapter and Conference Paper

    KBID: Kerberos Bracelet Identification (Short Paper)

    The most common method for a user to gain access to a system, service, or resource is to provide a secret, often a password, that verifies her identity and thus authenticates her. Password-based authentication...

    Joseph Carrigan, Paul Martin, Michael Rushanan in Financial Cryptography and Data Security (2017)

  6. No Access

    Chapter and Conference Paper

    Develo**, Provisioning and Controlling Time Critical Applications in Cloud

    Quality constraints on time critical applications require high-performance supporting infrastructure and sophisticated optimisation mechanisms for develo** and integrating system components. The lack of soft...

    Zhiming Zhao, Paul Martin, Andrew Jones in Advances in Service-Oriented and Cloud Com… (2018)

  7. Chapter

    Virtual Infrastructure Optimisation

    The increasing volumes of data being produced, curated and made available by research infrastructures in the environmental science domain require services able to optimise the delivery staging and process of d...

    Spiros Koulouzis, Paul Martin, Zhiming Zhao in Towards Interoperable Research Infrastruct… (2020)

  8. Chapter

    The ENVRI Reference Model

    Advances in automation, communication, sensing and computation enable experimental scientific processes to generate data at increasingly great speeds and volumes. Research infrastructures are devised to take a...

    Abraham Nieva de la Hidalga, Alex Hardisty in Towards Interoperable Research Infrastruct… (2020)

  9. Chapter

    Semantic Linking of Research Infrastructure Metadata

    The use of metadata to characterise scientific datasets, making data easier to discover and use directly by researchers and via various online data services, is one of the primary concerns of research infrastr...

    Paul Martin, Barbara Magagna, **aofeng Liao in Towards Interoperable Research Infrastruct… (2020)

  10. Chapter

    Semantic and Knowledge Engineering Using ENVRI RM

    The ENVRI Reference Model provides architects and engineers with the means to describe the architecture and operational behaviour of environmental and Earth science research infrastructures (RIs) in a standard...

    Paul Martin, **aofeng Liao, Barbara Magagna in Towards Interoperable Research Infrastruct… (2020)

  11. Chapter

    Data Cataloguing

    After a brief reminder on general concepts used in data cataloguing activities, this chapter provides information concerning the architecture and design recommendations for the implementation of catalogue syst...

    Erwann Quimbert, Keith Jeffery in Towards Interoperable Research Infrastruct… (2020)

  12. Chapter

    Common Challenges and Requirements

    Research infrastructures available for researchers in environmental and Earth science are diverse and highly distributed; dedicated research infrastructures exist for atmospheric science, marine science, solid...

    Barbara Magagna, Paul Martin in Towards Interoperable Research Infrastruct… (2020)

  13. Chapter

    Data Provenance

    The provenance of research data is of critical importance to the reproducibility of and trust in scientific results. As research infrastructures provide more amalgamated datasets for researchers and more integ...

    Barbara Magagna, Doron Goldfarb, Paul Martin in Towards Interoperable Research Infrastruct… (2020)

  14. No Access

    Chapter and Conference Paper

    Soft Prompt Transfer for Zero-Shot and Few-Shot Learning in EHR Understanding

    Electronic Health Records (EHRs) are a rich source of information that can be leveraged for various medical applications, such as disease inference, treatment recommendation, and outcome analysis. However, the...

    Yang Wang, Xue** Peng, Tao Shen, Allison Clarke in Advanced Data Mining and Applications (2023)