Lecturer in Law
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
O 'Dowd, A. (2017). SKiN Designing pseudo-physiology into personal technology devices to create enhanced interactions through visceral signifiers and behaviours
The majority of technology is now personal. Humans, in turn, are expected to and have personal relationships with their devices. The issue is that humans are biological beings...
Fragment Finder (FF) enables a new, high-speed approach to digital forensics. It is unique in that it will build a more efficient technical architecture for the creation, storage and use of hash signa...
The strategic development of technology and organisation to support the company’s growth in design, manufacture and
delivery of water treatment and energy conservation systems
Innovate KTP no. 010118
The DISTRO network brings together leading laboratories in Visual Computing and 3D Computer Graphics research across Europe with the aim of training a new generation of scientists, technologists, and ...
06 January 2016
Neil Urquhart and Alistair Lawson have been awarded £19,000 by The Data Lab to support their ongoing research collaboration with Larder Load, an Edinburgh based food services ...
18 July 2016
Congratulations to the following SIG members who have the following papers accepted at upcoming international conferences:
Alife 2016 (Cancun, Mexico) Simon Pow...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
Senior IT Developer
Senior Research Fellow
Senior IT Developer
Hall, H., Cruickshank, P. & Ryan, B. (in press). Exploring information literacy through the lens of Activity Theory. In Proceedings of the European Conference on Information LiteracyISBN n/a
Activity Theory (AT) is presented as a framework for explaining Information Literacy (IL) as a technologically mediated social practice. This is achieved in the context of a s...
Pomponi, L., Sablone, E., Rusconi Clerici, L., Consalez, L. & Pomponi, F. (2017). Transforming challenges into opportunities in social housing: a case study from Italy. In Brotas, L., Roaf, S. & Nicol, F. (Eds.). PLEA Conference Proceedings Volume IIIISBN N/A
Social housing often aims to provide sheltering for people on low incomes or with particular needs. This results in a constraints-dominated context where environmental and soc...
Pomponi, F., Medina Campos, L., Moncaster, A. & Smith, S. (2017). Bringing pupils into building energy performance: school design, construction and operation. In PLEA Conference Proceedings Volume IIIISBN N/A
Colegio Rochester is school in Colombia with a strong vision for sustainability. This vision permeates the new school building which was the first school in Latin America to b...
Pomponi, F. & Inzitari, G. (2017). Zooming in on biomimicry: the potential of tensegrity structures. In PLEA Conference ProceedingsISBN N/A
The foundations of biomimicry lie with the idea that Nature can inspire solutions to complex human problems. Biomimicry in Architecture is a rapidly growing field which also e...
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y. & Oakley, I. (in press). SmoothMoves: smooth pursuits head movements for augmented reality. In Proceedings of the 30th Annual ACM Symposium on User Interface Software & TechnologyISBN n/a
SmoothMoves is an interaction technique for augmented
reality (AR) based on smooth pursuits head movements. It
works by computing correlations between the movements
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Flint, T. & Hood, B. (in press). Eidolon360 – a VR Experience. In Proceedings of BHCI 2017ISBN Tbc
Flint, T. & Dylan, T. H. (in press). Aide Memoire. In Proceedings of BHCI 2017ISBN Tbc
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Buunk, I., Hall, H. & Smith, C. (in press). Skills in Sight: How Social Media Affordances Increase Network Awareness. In Proceedings of the 18th European Conference on Knowledge Management ECKM 2017ISBN n/a
The discussion in this paper derives from an analysis of data from twenty interviews conducted with members of an online knowledge sharing platform between October 2016 and Fe...
Urquhart, N. & Hart, E. (in press). Creating optimised employee travel plans. In TBCISBN TBC
The routing of employees who provide services such as home health or social care is a complex problem. When sending an employee between two addresses , there may exist more th...
Economic and Social Research Council
Integration of health and social care services is happening across the United Kingdom. Integrating services is important as it puts more focus on supporting the lives – not just the health – of indivi...
Scottish Institute for Policing Research
This project will entail a systematic literature review of police methods in visible policing to establish the current evidence base in relation to how these affect public confidence. This review will...
Chief Scientists Office
Chlamydia trachomatis is the most common sexually transmitted infection in Scotland, and has significant long‐term consequences to reproductive health. Recent studies suggest that in addition to the g...
Consejo Superior de Investigaciones Científicas
The main goal of this project is to understand the mechanisms responsible for the virulence of food-related yeasts on humans, and to provide tools and recommendations to prevent the release of yeasts ...
Carnegie Trust for the Universities of Scotland
Derek Hoy was a Scottish nurse based predominantly in Glasgow who died in 2012. He worked for many years in the National Health Service (NHS) in a variety of clinical roles, where he began to experime...
World Olympians Association
The World Olympians Association (WOA), as part of the International Olympic Committee, would like to find out more about the musculoskeletal issues faced by retired athletes. What the main issues are ...
Marine Alliance for Science & Technology for Scotland (Hosted by St Andrew's University)
Effects of Anthropogenic Noise on the Embryogenesis of Squids, Loligo spp.
Continuous Monitoring of Marine Soundscapes: Assessing Anthropogenic Noise Near Breeding Seabird Colonies
Exposure of early life stage marine invertebrates to playbacks of marine renewable energy device vibration
Exposure of Marine Invertebrate Larvae to Underwater Speaker Playbacks of Noise Pollution Sources in the Field
PhD student Edward Bolger
Higher Education Funding Council for England
The study is led by Blackburn College. We are an identified partner. The purpose of the project is to study staff and student experiences of the design and use of interactive essays and digital disser...
Scottish Funding Council
This project takes a new approach to teaching Mindful-breathing techniques to children aged 4-9.
Diagnosis of anxiety, stress, depression and ADHD in children has seen a significant increase over the...
V. Kann Rasmussen Foundation
The challenge that climate change poses to humanity and the natural environment is critical and well documented. Faced with such an unprecedented challenge, three responses are needed: drastic cuts in...
The Scottish Informatics & Computer Science Alliance
Research exchange with the Bielefeld Dialogue Systems group
Medical Research Council
Risks of developing many adult illnesses are set down as we develop in the womb, hence the environment we experience during fetal life needs to be ‘just right’. Understanding how the fetal environmen...
Developmental Dysplasia of the Hip (DDH) is a common walking di...
23 February 2016
18 May 2016
The June 2016 issue of Journal of Information Science (volume 42, issue 3) has just been published. This is a special issue of the journal that comprises twelve articles devel...
30 June 2016
The Cyber Academy and Hutchinson Networks have started a new collaborative project which aims to create a completely virtualized infrastructure which mirrors one that can be s...
04 November 2016
This paper explores the potential impact of BREXIT on the Scottish financial services sector. For the purpose of this discussion the assumption is that Scotland remains part o...
05 May 2016
Professor Hazel Hall took part in a webinar interview today hosted by Science in Australia Gender Equity (SAGE). The SAGE team asked Hall about her experience of leading Edinb...
28 June 2016
Augusto Esteves was awarded a Carnegie Research Incentive Grant (http://www.carnegie-trust.org/schemes/research-schemes/research-incentive-grants.html).
10 March 2016
Dr Achille Fonzone and Ruggiero Lovreglio (a visiting student from Politecnico di Bari who spent almost 2 years at TRI between 2013 and 2015) were invited to wr...
23 June 2016
Dr Brian Detlor has been appointed Visiting Professor to the School of Computing at Edinburgh Napier University. This appointment formalises Brian’s long-standing relationship...
19 May 2016
Community in Modern Scottish Literature, published by Brill and edited by Scott Lyall, is out this month. This contains a chapter by Lyall and a 10,000-word introduction.
My chapter ‘“Now– well, look at the chart”: Mapping, Maps and Literature’ for the volume Mapping Across Academia, eds. Stanley D. Brunn and Martin Dodge (Springer) is in press...
Prime numbers are used extensively in public key encryption key, typically where we take two prime numbers and multiply them together to give a modulus (N). This modulus is ...
16 June 2016
TRi PhD student Moira Weir successfully completed her PhD research entitled ‘The role of taxis in the supply of transport to the night time economy and identification of the b...