Now showing items 1-6 of 6

    • Enhancing textual accessibility for readers with dyslexia through transfer learning 

      Madjidi, Elham; Crick, Christopher (Association for Computing Machinery (ACM), 2023-10-22)
      This paper explores automated modification of text to make it more accessible for people with dyslexia, a reading disorder affecting a significant percentage of the global population. The modifications are both in terms ...
    • Evaluating verification awareness as a method for assessing adaptation risk 

      Riley, Ian; Jahan, Sharmin; Marshall, Allen; Walter, Charles; Gamble, Rose F. (Elsevier, 2021-02-22)
      Self-integration requires a system to be self-aware and self-protecting of its functionality and communication processes to mitigate interference in accomplishing its goals. Incorporating self-protection into a framework ...
    • MAPE-K/MAPE-SAC: An interaction framework for adaptive systems with security assurance cases 

      Jahan, Sharmin (Elsevier, 2020-04-06)
      Security certification establishes that a given system satisfies properties and constraints as specified in the system security profile. Mechanisms and techniques have been developed to assess if and how well the system ...
    • Siegebreaker: an SDN based practical decoy routing system 

      Sharma, Piyush Kumar; Gosain, Devashish; Sagar, Himanshu; Kumar, Chaitanya; Dogra, Aneesh; Naik, Vinayak; Acharya, HB; Chakravarty, Sambuddho (Privacy Enhancing Technologies Symposium Advisory Board, 2020-07-13)
      Decoy Routing (DR), a promising approach to censorship circumvention, uses routers (rather than end hosts) as proxy servers. Users of censored networks, who wish to use DR, send specially crafted packets, nominally addressed ...
    • Speed Eleusis: variation on an old educational card game 

      Walkup, John R.; Key, Roger (American Association of Physics Teachers (AAPT), 2020-03)
      In this article, we describe a fun and engaging card game called Speed Eleusis that teaches the process of scientific discovery and publication, including such practices as replication and retraction. Much like the traditional ...
    • Troubleshooting blackbox SDN control software with minimal causal sequences 

      Scott, Colin; Wundsam, Andreas; Raghavan, Barath; Panda, Aurojit; Or, Andrew; Lai, Jefferson; Huang, Eugene; Liu, Zhi; El-Hassany, Ahmed; Whitlock, Sam; Acharya, HB; Zarifis, Kyriakos; Shenker, Scott (Association for Computing Machinery (ACM), 2014-08-17)
      Software bugs are inevitable in software-defined networking control software, and troubleshooting is a tedious, time-consuming task. In this paper we discuss how to improve control software troubleshooting by presenting a ...