Date


People

Download Available

Dewey Decimal

933 results

Making and Unfinishedness: Designing Toolkits for Negotiation

Journal Article
Smyth, M., & Helgason, I. (2017)
Making and Unfinishedness: Designing Toolkits for Negotiation. Design Journal, 20(sup1), S3966-S3974. https://doi.org/10.1080/14606925.2017.1352899
The diffusion and democratisation of computing technologies and physical prototyping systems has supported the rise of Do-It-Yourself culture. In the context of design innovat...

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks

Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018)
Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771
In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer gre...

Towards Modelling and Reasoning about Uncertain Data of Sensor Measurements for Decision Support in Smart Spaces.

Conference Proceeding
Bamgboye, O., Liu, X., & Cruickshank, P. (2018)
Towards Modelling and Reasoning about Uncertain Data of Sensor Measurements for Decision Support in Smart Spaces. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/COMPSAC.2018.10330
Smart Spaces currently benefits from Internet of Things (IoT) infrastructures in order to realise its objectives. In many cases, it demonstrates this through certain automated...

A novel hybrid intelligence approach for 2D packing through internet crowdsourcing

Conference Proceeding
Agrawal, A., Yadav, P., Upadhyay, C. K., Corney, J. R., Vasantha, G. A., Jagadeesan, A., & Lynn, A. (2015)
A novel hybrid intelligence approach for 2D packing through internet crowdsourcing. In Technological Innovation in ICT for Agriculture and Rural Development (TIAR), 2015 IEEE, 33-39. https://doi.org/10.1109/TIAR.2015.7358527
Packing problems on its current state are being utilized for wide area of industrial applications. The aim of present research is to create and implement an intelligent system...

A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments

Book Chapter
Jaroucheh, Z., Liu, X., & Smith, S. (2014)
A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments. In Software Design and Development, (71-95). IGI Global. https://doi.org/10.4018/978-1-4666-4301-7.ch005
Context-awareness is considered to be the cornerstone technique for developing pervasive computing applications that are flexible, adaptable, and capable of acting autonomousl...

Interaction strategies for an affective conversational agent

Journal Article
Smith, C., Crook, N., Dobnik, S., Charlton, D., Boye, J., Pulman, S., …Cavazza, M. (2011)
Interaction strategies for an affective conversational agent. Presence: Teleoperators and Virtual Environments, 20, 395-411. https://doi.org/10.1162/PRES_a_00063
The development of embodied conversational agents (ECA) as companions brings several challenges for both affective and conversational dialogue. These include challenges in gen...

Developing a core ontology for taxonomic data.

Conference Proceeding
Kennedy, J., Gales, R., Hyam, R., Kukla, R., Wieczorek, J., Hagedorn, G., …Vieglais, D. (2006)
Developing a core ontology for taxonomic data. In L. Belbin, A. Rissoné, & A. Weitzman (Eds.), Proceedings of TDWG (2006), St Louis, MI
Over recent years several sub-groups within the Taxonomic Databases Working Group (TDWG) have developed models and exchange standards to facilitate data sharing within the tax...

Privacy-preserving Surveillance Methods using Homomorphic Encryption

Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (240-248). https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset

Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...