scispace - formally typeset
Search or ask a question
Institution

University of Cyprus

EducationNicosia, Cyprus
About: University of Cyprus is a education organization based out in Nicosia, Cyprus. It is known for research contribution in the topics: Large Hadron Collider & Standard Model. The organization has 3624 authors who have published 15157 publications receiving 412135 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the invariant mass distribution of jet pairs produced in association with a W boson was studied and the observed distribution has an excess in the 120-160 GeV/c(2) mass range which is not described by current theoretical predictions within the statistical and systematic uncertainties.
Abstract: We report a study of the invariant mass distribution of jet pairs produced in association with a W boson using data collected with the CDF detector which correspond to an integrated luminosity of 4.3 fb(-1). The observed distribution has an excess in the 120-160 GeV/c(2) mass range which is not described by current theoretical predictions within the statistical and systematic uncertainties. In this Letter, we report studies of the properties of this excess.

108 citations

Journal ArticleDOI
TL;DR: Under the conditions applied, all three systems proved to be effective in inducing diclofenac oxidation, leading to 22% of mineralization for O(3) and 36% for US after 40min of treatment, and to a significantly higher mineralization level for shorter treatment duration.

108 citations

Journal ArticleDOI
TL;DR: It is argued that perceptual learning does not threaten the cognitive impenetrability of perception, and that the neuropsychological research does not provide evidence in favor of the top-down character of perception.

107 citations

Proceedings Article
11 Jul 2018
TL;DR: This paper shows that an attacker can trigger and exploit Rowhammer bit flips directly from a remote machine by only sending network packets, and proposes protecting unmodified applications with a new buffer allocator that is capable of fine-grained memory isolation in the DRAM address space.
Abstract: Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerable system to escalate privileges and compromise browsers, clouds, and mobile systems. In all these attacks, the common assumption is that attackers first need to obtain code execution on the victim machine to be able to exploit Rowhammer either by having (unprivileged) code execution on the victim machine or by luring the victim to a website that employs a malicious JavaScript application. In this paper, we revisit this assumption and show that an attacker can trigger and exploit Rowhammer bit flips directly from a remote machine by only sending network packets. This is made possible by increasingly fast, RDMA-enabled networks, which are in wide use in clouds and data centers. To demonstrate the new threat, we show how a malicious client can exploit Rowhammer bit flips to gain code execution on a remote key-value server application. To counter this threat, we propose protecting unmodified applications with a new buffer allocator that is capable of fine-grained memory isolation in the DRAM address space. Using two real-world applications, we show that this defense is practical, self-contained, and can efficiently stop remote Rowhammer attacks by surgically isolating memory buffers that are exposed to untrusted network input.

107 citations

Journal ArticleDOI
TL;DR: This paper discusses algorithms, protocols, and mechanisms that deal directly with congestion control and avoidance in WSNs, a special category of wireless ad hoc networks with unique characteristics and important limitations.
Abstract: Congestion control and reliable data delivery are two primary functions of the transport layer in wired and wireless networks. Wireless sensor networks (WSNs) are a special category of wireless ad hoc networks with unique characteristics and important limitations. Limitations concern their resources, such as energy, memory, and computational power, as well as their applications. Due to these limitations and characteristics, the Transmission Control Protocol (TCP), the legacy protocol that implements congestion control and reliable transmission in the Internet, cannot apply to WSNs in its traditional form. To deal with this unavailability of a standard solution, many efforts are taking place in this area. In this paper, we review, classify, and compare algorithms, protocols, and mechanisms that deal directly with congestion control and avoidance in WSNs.

107 citations


Authors

Showing all 3715 results

NameH-indexPapersCitations
Luca Lista1402044110645
Peter Wittich1391646102731
Stefano Giagu1391651101569
Norbert Perrimon13861073505
Pierluigi Paolucci1381965105050
Kreso Kadija135127095988
Daniel Thomas13484684224
Julia Thom132144192288
Alberto Aloisio131135687979
Panos A Razis130128790704
Jehad Mousa130122686564
Alexandros Attikis128113677259
Fotios Ptochos128103681425
Charalambos Nicolaou128115283886
Halil Saka128113777106
Network Information
Related Institutions (5)
Arizona State University
109.6K papers, 4.4M citations

92% related

Georgia Institute of Technology
119K papers, 4.6M citations

91% related

École Polytechnique Fédérale de Lausanne
98.2K papers, 4.3M citations

91% related

Tel Aviv University
115.9K papers, 3.9M citations

91% related

University of California, Santa Barbara
80.8K papers, 4.6M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202342
2022126
20211,224
20201,200
20191,044
20181,009