Research explorer tool

23 results

Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds

Conference Proceeding
Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., …Gavras, A. (2013)
Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds. In 2013 Tenth International Conference on Information Technology: New Generations (ITNG),, 459-463. https://doi.org/10.1109/itng.2013.77
Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on clou...

TraceMatch: a computer vision technique for user input by tracing of animated controls

Conference Proceeding
Esteves>, A., Clarke, C., Bellino, A., Esteves, A., Velloso, E., & Gellersen, H. (2016)
TraceMatch: a computer vision technique for user input by tracing of animated controls. In UbiComp '16 Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (298-303). https://doi.org/10.1145/2971648.2971714
Recent works have explored the concept of movement correlation interfaces, in which moving objects can be selected by matching the movement of the input device to that of the ...

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

Journal Article
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...

Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption

Conference Proceeding
Asif, R., & Buchanan, W. J. (2017)
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...

Generating and Evaluating Landmark-Based Navigation Instructions in Virtual Environments

Conference Proceeding
Cercas Curry, A., Gkatzia, D., & Rieser, V. (2015)
Generating and Evaluating Landmark-Based Navigation Instructions in Virtual Environments. In Proceedings of the 15th European Workshop on Natural Language Generation, 90-94. https://doi.org/10.18653/v1/w15-4715
Referring to landmarks has been identified to lead to improved navigation instructions. However, a previous corpus study suggests that human “wizards” also choose to refer to ...

Wattom: Ambient Eco-feedback with Mid-air Input

Conference Proceeding
Esteves, A., Quintal, F., Caires, F., Baptista, V., & Mendes, P. (2019)
Wattom: Ambient Eco-feedback with Mid-air Input. In 2019 5th Experiment International Conference (exp.at'19)https://doi.org/10.1109/EXPAT.2019.8876565
This paper presents Wattom, a highly interactive ambient eco-feedback smart plug that aims to promote a more sustainable use of electricity in the home. This paper describes o...

Spatial anomaly detection in sensor networks using neighborhood information

Journal Article
Bosman, H. H., Iacca, G., Tejada, A., Wörtche, H. J., & Liotta, A. (2017)
Spatial anomaly detection in sensor networks using neighborhood information. Information Fusion, 33, 41-56. https://doi.org/10.1016/j.inffus.2016.04.007
The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological ad...

A topological insight into restricted Boltzmann machines

Journal Article
Mocanu, D. C., Mocanu, E., Nguyen, P. H., Gibescu, M., & Liotta, A. (2016)
A topological insight into restricted Boltzmann machines. Machine Learning, 104(2-3), 243-270. https://doi.org/10.1007/s10994-016-5570-z
Restricted Boltzmann Machines (RBMs) and models derived from them have been successfully used as basic building blocks in deep artificial neural networks for automatic feature...

Estimating 3D trajectories from 2D projections via disjunctive factored four-way conditional restricted Boltzmann machines

Journal Article
Mocanu, D. C., Bou Ammar, H., Puig, L., Eaton, E., & Liotta, A. (2017)
Estimating 3D trajectories from 2D projections via disjunctive factored four-way conditional restricted Boltzmann machines. Pattern Recognition, 69, 325-335. https://doi.org/10.1016/j.patcog.2017.04.017
Estimation, recognition, and near-future prediction of 3D trajectories based on their two dimensional projections available from one camera source is an exceptionally difficul...

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks

Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018)
Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771
In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer gre...