About
44
Publications
4,182
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,571
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
Education
November 2007 - September 2014
Publications
Publications (44)
Compiling applications as unikernels allows them to be tailored to diverse execution environments. Dependency on a monolithic operating system is replaced with linkage against libraries that provide specific services. Doing so in practice has revealed a major barrier: managing the configuration matrix across heterogenous execution targets. A realis...
In this chapter, our focus is on issues faced when developing tourism in a region located in and on the fringe. To illustrate our discussion we use the Dalarna region in southern central Sweden as an example. This region is perceived by many of those involved in tourism development as a homogenous entity. We suggest that, at least in part, this is...
This (working) paper seeks to explore the role of food in contemporary society. Through consideration of the changing nature of the consumption and production of food within leisure and tourism, this paper suggests that food can be seen as a metaphor for Bauman’s (2000) liquid modernity. The paper’s conceptual focus considers the intersections of f...
Symbolic interactionism has its foundations within a pragmatic philosophical tradition. Fundamentally, its meaning is found in and through social interactions and encounters. Its particular strength is the empirical approach it encourages during meaning making. Empirically, it has, as its focus, the observation, recording, and analysis of social ac...
The ‘idea’ of tourism, often understood as an escape from day to day life at home, means that the mundane performances and spaces of everyday life within the tourism experience are rarely considered. In this thesis I demonstrate that by exploring these mundane spaces and practices, a better understanding of the identity performances of individuals...
We present unikernels, a new approach to deploying cloud services via applications written in high-level source code. Unikernels are single-purpose appliances that are compile-time specialised into standalone kernels, and sealed against modification when deployed to a cloud platform. In return they offer significant reduction in image sizes, improv...
In this paper we highlight the contribution which an understanding of mobilities brings to an analysis of hospitality work. The complex mobilities of hospitality employees are playing an increasing role within global tourism and hospitality sectors. Our discussion explores notions of voluntary mobility as motivated by work and lifestyle factors. We...
We present unikernels , a new approach to deploying cloud services via applications written in high-level source code. Unikernels are single-purpose appliances that are compile-time specialised into standalone kernels, and sealed against modification when deployed to a cloud platform. In return they offer significant reduction in image sizes, impro...
We present unikernels, a new approach to deploying cloud services via applications written in high-level source code. Unikernels are single-purpose appliances that are compile-time specialised into standalone kernels, and sealed against modification when deployed to a cloud platform. In return they offer significant reduction in image sizes, improv...
The last 20 years have seen a burgeoning of social scientific and historical research on food. The field has drawn in experts to investigate topics such as: the way globalisation affects the food supply; what cookery books can (and cannot) tell us; changing understandings of famine; the social meanings of meals - and many more. Now sufficiently ext...
We present a case-study of using OCaml within a large product development project, focussing on both the technical and non- technical issues that arose as a result. We draw comparisons be- tween the OCaml team and the other teams that worked on the project, providing comparative data on hiring patterns and cross- team code contribution.
We present a case-study of using OCaml within a large product development project, focussing on both the technical and non-technical issues that arose as a result. We draw comparisons between the OCaml team and the other teams that worked on the project, providing comparative data on hiring patterns and cross-team code contribution.
Data are personally identifiable if they can be attributed to a particular individual. Therefore, data privacy is concerned with the protection of personally identifiable information that, if unconditionally published, would violate an individual's privacy. For example, the right to solitude is violated if surveillance cameras peer into homes and a...
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems. Type-safe languages eliminate many errors but are not used to due to the perceived performance overheads.
We combine two techniques to eliminate this performance penalty...
Most implementations of critical Internet protocols are written in type-unsafe languages such as C or C++ and are regularly vulnerable to serious security and reliability problems. Type-safe languages eliminate many errors but are not used to due to the perceived performance overheads.
We combine two techniques to eliminate this performance penalty...
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a user-experience study is described in which participants were both observed learning to interact with a prototype mobile service and interviewed about their experiences. Secondly, a pointing-device task is presented in which quantitative data was gathere...
Conventional software model-checking involves (i) creating an abstract model of a complex application; (ii) validating this model against the application; and (iii) checking safety properties against the abstract model. To non-experts, steps (i) and (ii) are often the most daunting. Firstly how does one decide which aspects of the application to in...
A multi-site system consists of a collection of locally-managed networks called sites, each containing a collection of processors. In this paper, we present the multisite threshold model: a new failure model for multi-site systems that accounts for failures ...
We investigate how smart phones can augment site-specific services - that is, electronic services or applications that reside in a specific location. Site-specific services already exist in the form of ticket machines, electronic information kiosks, interactive product catalogues, and so on. However, integrating users' smart phones into these inter...
One factor that has limited the use of Bluetooth as a networking technology for publicly accessible mobile services is the way in which it handles Device Discovery. Establishing a Bluetooth connection between two devices that have not seen each other before is slow and, from a usability perspective, often awkward. In this paper we present the imple...
The Active Bat system provides the ability to locate users and equipment with a high degree of accuracy and coverage. Despite this, participation is low. We are concerned that this is symptomatic of a fundamental problem in location-aware computing; specifically the lack of understanding about which applications are useful and what factors motivate...
We are witnessing the development of large-scale location systems and a corresponding rise in the popularity of location-aware applications, especially games. Traditional computer games have pushed the limits of CPU and graphics card performance for many years and experience suggests that location-aware games will place similar demands upon locatio...
The Active Bat system provides the ability to locate users and equipment with a high degree of accuracy and coverage. Despite this, participation is low. We are concerned that this is symptomatic of a fundamental problem in location-aware computing; specifically the lack of understanding about which applications are useful and what factors motivate...
We are witnessing the development of large-scale location systems and a corresponding rise in the popularity of location-aware applications, especially games. Traditional computer games have pushed the limits of CPU and graphics card performance for many years and experience suggests that location-aware games will place similar demands upon locatio...
We propose audio networking: using ubiquitously available sound hardware (i.e. speakers, sound-cards and microphones) for low-bandwidth, wireless networking. A variety of location- and context-aware applications that use audio networking are presented including a location system, a pick-and-drop interface and a framework for embedding digital attac...
Mobile applications are programs which are able to move themselves between hosts on the network. Sentient applications are programs which can exploit the existence of pervasive networked sensor devices to observe their environment and react accordingly. We believe that properly designed and constrained sentient mobile applications provide a good fo...
A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobile agents are a promising new programming methodology for building distributed applications with many advantages over traditional clientserver designs.We believe that properly contr...
As Internet connectivity grows executing un- trusted code becomes an increasingly serious threat. Pub- lic Key Infrastructure (PKI) and digital signatures offer some degree of protection, but are only part of a solution. In this paper we propose a mechanism of forcing appli- cations to "declare what they intend to do" by means of an abstract behavi...
Application-level web security refers to vulnerabilities inherent in the code of a web-application itself (irrespective of the technologies in which it is implemented or the security of the web-server/back-end database on which it is built). In the last few months application-level vulnerabilities have been exploited with serious consequences: hack...
Implementing web-applications securely is a laborious and error-prone task; as a result a large number of (professionally designed) websites suffer from serious application-level security vulnerabilities. In this paper we describe SPECTRE, a tool which helps to secure dynamic web-applications. As well as aiding in the development process of new app...
Implementing web-applications securely is a laborious and error-prone task; as a result a large number of (professionally designed ) websites suffer from serious application-level security vulnerabilities. In t his paper we describe SPEC- TRE, a tool which helps to secure dynamic web-applications. As well as aiding in the development process of new...