The use of design activity for research into Computer Supported Co-operative Work (CSCW)
Garner, S. W., Scrivener, S. A. R., Clarke, A. A., Clark, S., Connolly, J. H., Palmen, H., …Smyth, M. G. (1990)
The use of design activity for research into Computer Supported Co-operative Work (CSCW). In J. Smith (Ed.), DATER 91, 84-96
This paper describes current research at Loughborough University in the field of Computer Supported Co-operative Working (CSCW). The project, which is funded by the Informatio...
Personification technologies: developing artificial companions for older people.
Mival, O., Cringean, S., & Benyon, D. (2004)
Personification technologies: developing artificial companions for older people. In CHI 2004 conference proceedings : Connect
This paper reports on the work of the UTOPIA project, a consortium of four Scottish universities concerned with technology issues for older people, focusing specifically on ar...
The Communities of Practice model for understanding digital engagement by hyperlocal elected representatives
Cruickshank, P., & Ryan, B. (2016)
The Communities of Practice model for understanding digital engagement by hyperlocal elected representatives. In M. Janssen, M. A. Wimmer, Ø. Sæbø, T. A. Pardo, P. Panagiotopoulos, M. Gascó, …E. Tambouris (Eds.), Electronic Government and Electronic Participation, 11-18. https://doi.org/10.3233/978-1-61499-570-8-11
There has been much research into citizens’ engagement with their representatives. This paper offers an approach to understanding sustained take-up of internet technologies by...
Enhancing Big Data Security with Collaborative Intrusion Detection
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014)
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Improving cloud network security using the Tree-Rule firewall
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014)
Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The r...
Hybrid Tree-rule Firewall for High Speed Data Transmission
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...
Life at the local scale: an alternative perspective on the urban.
Smyth, M., & Helgason, I. (2015)
Life at the local scale: an alternative perspective on the urban. In Hybrid Cities - data to the peoplehttps://doi.org/10.13140/RG.2.1.3740.2083
The study of cities has risen to the top of research agendas in the last decade, raising the question of how to study something as vast and eclectic as cities. This paper prop...
A local search for the timetabling problem.
Rossi-Doria, O., Blum, C., Knowles, J., Sampels, M., Socha, K., & Paechter, B. (2001)
A local search for the timetabling problem. In E. Burke, & P. Causmaecker (Eds.), Proceedings of the Conference on the Practice and Theory of Automated Timetabling (PATAT 2002), 124-127
This work is part of the Metaheuristic Network, a European Commission project that seeks to empirically compare the performance of various metaheuristics on different combinat...
A framework for engineering metaphor at the user interface
Alty, J., Knott, R., Anderson, B., & Smyth, M. (2000)
A framework for engineering metaphor at the user interface. Interacting with Computers, 13(2), (301-322). ISSN 0953-5438
Interface metaphors facilitate the learning of new computer systems by supporting the transformation of existing knowledge in order to improve the comprehension of novel situa...