Date


School

People

Output Type

Download Available

145 results

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids

Conference Proceeding
Powers, S. T., Meanwell, O., & Cai, Z. (2019)
Finding Fair Negotiation Algorithms to Reduce Peak Electricity Consumption in Micro Grids. In PAAMS 2019: Advances in Practical Applications of Survivable Agents and Multi-Agent Systems: The PAAMS Collection, 269-272. https://doi.org/10.1007/978-3-030-24209-1_28
Reducing peak electricity consumption is important to maximise use of renewable energy sources, and reduce the total amount of capacity required on a grid. Most approaches use...

Quantifying the effects of increasing user choice in MAP-Elites applied to a Workforce Scheduling and Routing Problem.

Conference Proceeding
Urquhart, N., Hart, E., & Hutcheson, W. (2019)
Quantifying the effects of increasing user choice in MAP-Elites applied to a Workforce Scheduling and Routing Problem. In EvoApplications 2019: Applications of Evolutionary Computation, 49-63. https://doi.org/10.1007/978-3-030-16692-2_4
Quality-diversity algorithms such as MAP-Elites provide a means of supporting the users when finding and choosing solutions to a problem by returning a set of solutions which ...

Designing Motion Matching for Real-World Applications: Lessons from Realistic Deployments

Conference Proceeding
Verweij, D., Esteves, A., Bakker, S., & Khan, V. (2019)
Designing Motion Matching for Real-World Applications: Lessons from Realistic Deployments. In TEI '19 Proceedings of the Thirteenth International Conference on Tangible, Embedded, and Embodied Interaction, (645-656). https://doi.org/10.1145/3294109.3295628
Amongst the variety of (multi-modal) interaction techniques that are being developed and explored, the Motion Matching paradigm provides a novel approach to selection and cont...

Wattom: a Consumption and Grid Aware Smart Plug with Mid-air Controls

Conference Proceeding
Quintal, F., Esteves, A., Caires, F., Baptiste, V., & Mendes, P. (2019)
Wattom: a Consumption and Grid Aware Smart Plug with Mid-air Controls. In TEI '19 Proceedings of the Thirteenth International Conference on Tangible, Embedded, and Embodied Interaction, (307-313). https://doi.org/10.1145/3294109.3295642
This paper presents Wattom, a highly interactive ambient eco-feedback smart plug that aims to support a more sustainable use of electricity by being tightly coupled to users' ...

A new security approach for the spectrum access in vehicular networks

Conference Proceeding
Alsarhan, A., Al-Dubai, A., Kilani, Y., & Alkhalidy, M. (2019)
A new security approach for the spectrum access in vehicular networks
Vehicular ad hoc networks (VANETs) have been instrumental in intelligent transportation systems that enhances road safety and road management significantly. This technology en...

A Cooperative Learning Approach for the Quadratic Knapsack Problem

Conference Proceeding
Lalla-Ruiz, E., Segredo, E., & Voß, S. (2018)
A Cooperative Learning Approach for the Quadratic Knapsack Problem. In Learning and Intelligent Optimization Conference (LION12). , (31-35). https://doi.org/10.1007/978-3-030-05348-2_3
The Quadratic Knapsack Problem (QKP) is a well-known optimization problem aimed to maximize a quadratic objective function subject to linear capacity constraints. It has sever...

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018)
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)https://doi.org/10.1109/CyberSecPODS.2018.8560683
Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development ov...

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings

Conference Proceeding
(2018)
Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. In I. Romdhani, L. Shu, H. Takahiro, Z. Zhou, T. Gordon, & D. Zeng (Eds.), Collaborative Computing: Networking, Applications and Worksharinghttps://doi.org/10.1007/978-3-030-00916-8
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, Collabora...

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things

Conference Proceeding
Semedo, F., Moradpoor, N., & Rafiq, M. (2018)
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. In SIN '18 Proceedings of the 11th International Conference on Security of Information and Networkshttps://doi.org/10.1145/3264437.3264438
The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Position...