Research explorer tool

Date


School

Themes

Output Type

Download Available

25 results

EniSpace: Evaluating Navigation in Information Space

Conference Proceeding
McCall, R., & Benyon, D. (1998)
EniSpace: Evaluating Navigation in Information Space. In P. De Bra, & J. J. Leggett (Eds.), Proceedings of WebNet World Conference on the WWW and Internet 1999, 1344-1345
Traditional methods of evaluating usability such as heuristic evaluation and cognitive walkthrough do not address all issues relating to navigation. This is despite the fact t...

A software tool for evaluating navigation

Conference Proceeding
McCall, R., & Benyon, D. (1997)
A software tool for evaluating navigation. In J. May, J. Siddiqui, & J. Wilkinson (Eds.), HCI’98 Conference Companion, 72-73
Traditional methods of evaluating the usability of software systems largely ignore the problem of navigation within computer based environments. In contrast the 'Navigation of...

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015)
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), (1109-1117). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.166
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...

Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds

Conference Proceeding
Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., …Gavras, A. (2013)
Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds. In 2013 Tenth International Conference on Information Technology: New Generations (ITNG),, 459-463. https://doi.org/10.1109/itng.2013.77
Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on clou...

An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology

Conference Proceeding
Sotiriadis, S., Petrakis,, E. G. M., Covaci, . S., Zampognaro, P., Georga, E., & Thuemmler, C. (2014)
An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology. In 13th IEEE International Conference on BioInformatics and BioEngineering, 1-6. doi:10.1109/bibe.2013.6701578
The emergency of cloud computing and Generic Enablers (GEs) as the building blocks of Future Internet (FI) applications highlights new requirements in the area of cloud servic...

TraceMatch: a computer vision technique for user input by tracing of animated controls

Conference Proceeding
Esteves>, A., Clarke, C., Bellino, A., Esteves, A., Velloso, E., & Gellersen, H. (2016)
TraceMatch: a computer vision technique for user input by tracing of animated controls. In UbiComp '16 Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (298-303). https://doi.org/10.1145/2971648.2971714
Recent works have explored the concept of movement correlation interfaces, in which moving objects can be selected by matching the movement of the input device to that of the ...

Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption

Conference Proceeding
Asif, R., & Buchanan, W. J. (2017)
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...

Performance evaluation of RPL metrics in environments with strained transmission ranges.

Conference Proceeding
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017)
Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). https://doi.org/10.1109/aiccsa.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...

Security, privacy and safety evaluation of dynamic and static fleets of drones

Conference Proceeding
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017)
Security, privacy and safety evaluation of dynamic and static fleets of drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),https://doi.org/10.1109/dasc.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...

Commonsense-enhanced Natural Language Generation for Human-Robot Interaction

Conference Proceeding
Gkatzia, D. (in press)
Commonsense-enhanced Natural Language Generation for Human-Robot Interaction
Commonsense is vital for human communication, as it allows us to make inferences without explicitly mentioning the context. Equipping robots with commonsense knowledge would l...