18 results

Towards a scalable broadcast in wormhole-switched mesh networks

Conference Proceeding
Al-Dubai, A. Y., Ould-Khaoua, M., & Mackenzie, L. M. (2002)
Towards a scalable broadcast in wormhole-switched mesh networks. In Proceedings of the 2002 ACM symposium on Applied computing, 840-844. https://doi.org/10.1145/508791.508955
Broadcast algorithms for wormhole--switched meshes have been widely reported in the literature. However, most of these algorithms handle broadcast in a sequential manner and d...

An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology

Conference Proceeding
Sotiriadis, S., Petrakis,, E. G. M., Covaci, . S., Zampognaro, P., Georga, E., & Thuemmler, C. (2014)
An architecture for designing Future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology. In 13th IEEE International Conference on BioInformatics and BioEngineering, 1-6. doi:10.1109/bibe.2013.6701578
The emergency of cloud computing and Generic Enablers (GEs) as the building blocks of Future Internet (FI) applications highlights new requirements in the area of cloud servic...

Future risks – Including the rise of the hacktivism.

Conference Proceeding
Buchanan, W. J. (2011)
Future risks – Including the rise of the hacktivism. In National Information Security Conference (NISC)
As organisations move towards infrastructures which are highly dependent on their Web infrastructure, they are now at great risk from external parties who can use a number of ...

Health 4.0: The Case of Multiple Sclerosis

Conference Proceeding
Grigoriadis, N., Bakirtzis, C., Politis, C., Danas, K., & Thuemmler, C. (2016)
Health 4.0: The Case of Multiple Sclerosis. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). , (100-104). https://doi.org/10.1109/healthcom.2016.7749437
Multiple sclerosis is a chronic and variable disease in matters of symptoms, clinical course and outcome. The ultimate goal of currently used drugs and therapeutic strategies ...

Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds

Conference Proceeding
Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., …Gavras, A. (2013)
Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds. In 2013 Tenth International Conference on Information Technology: New Generations (ITNG),, 459-463. https://doi.org/10.1109/itng.2013.77
Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on clou...

Specification for Generic Enablers as Software

Conference Proceeding
Brogan, J. P., & Thuemmler, C. (2014)
Specification for Generic Enablers as Software. In 2014 11th International Conference on Information Technology: New Generations, 129-136. doi:10.1109/itng.2014.51
Generic Enablers are a specialism of software engineering. They are components used for providing reusable building blocks that enable the construction of applications for fut...

U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks

Conference Proceeding
Zeb, K., Saleem, K., Al Muhtadi, J., & Thuemmler, C. (2016)
U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). , (562-567). https://doi.org/10.1109/HealthCom.2016.7749518
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging.

Conference Proceeding
Graves, J., Buchanan, W. J., Saliou, L. & Old, L. J. (2006)
Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. ISBN 1905305206
Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers ...