Research explorer tool

Date


People

Download Available

Dewey Decimal

863 results

HI-risk: A method to analyse health information risk intelligence

Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...

Towards Trust and Governance in Integrated Health and Social Care Platforms

Book Chapter
Buchanan, W., Thuemmler, C., Spyra, G., Smales, A., & Prajapati, B. (2017)
Towards Trust and Governance in Integrated Health and Social Care Platforms
The way we are sharing health and care data will be changing considerably over the years to come. One of the reasons is an increasing move towards patient-centric approaches w...

A social-technological alignment matrix.

Conference Proceeding
Thuemmler, C., Mival, O., Lim, A. K., Holanec, I., & Fricker, S. (2015)
A social-technological alignment matrix. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 200-205. https://doi.org/10.1109/healthcom.2014.7001841
This paper refers to the term " implementation " as the Especially in health care this has proven to be a very critical phase Although strategies such as requirements engineer...

Ethical assessment in e-Health

Conference Proceeding
Gonzalez-Pinto, A., Ruiz de Azua, S., Mival, O. H., Thuernmler, C., Jumelle, A. K. L., Ispas, I., …González-Pinto, A. (2015)
Ethical assessment in e-Health. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 262-268. https://doi.org/10.1109/healthcom.2014.7001852
While innovative e-Health and m-Health technologies and solutions will eventually change the way health and social care are delivered, it raises many challenges regarding what...

Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet

Conference Proceeding
Paulin, A., & Thuemmler, C. (2016)
Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, (245-248). https://doi.org/10.1109/HealthCom.2016.7749462
This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in tw...

Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services

Conference Proceeding
Lim, A. K., Thuemmler, C., Paulin, A., Jell, T., & Keow Lim, A. K. (2017)
Information Technology – Next Generation: The Impact of 5G on the Evolution of Health and Care Services. In S. Latifi (Ed.), Information Technology-Next Generation. , (811-817). https://doi.org/10.1007/978-3-319-54978-1_100
As more and more details of 5G technology specifications unveil and standards emerge it becomes clear that 5G will have an enabling effect on many different verticals includin...

CACA-UAN: a context-aware communication approach to efficient and reliable underwater acoustic sensor networks

Journal Article
Liu, Q., Chen, X., Liu, X., & Linge, N. (2018)
CACA-UAN: a context-aware communication approach to efficient and reliable underwater acoustic sensor networks. International Journal of Sensor Networks, 26(1), 1. https://doi.org/10.1504/ijsnet.2018.088364
Underwater Acoustic Sensor Networks (UANs) have emerged as a promising technology recently which can be applied in many areas such as military and civil, where the communicati...

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks

Conference Proceeding
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017)
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESShttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...

Information Diffusion in Multi-Agent Communities

Conference Proceeding
Farrenkopf, T., Guckert, M., Urquhart, N., & Wells, S. (in press)
Information Diffusion in Multi-Agent Communities. In Conference Proceedings
Understanding the course of events when newly launched products penetrate a market, and how those products supersede existing dominant products, is crucial. Besides potential ...

A Unifying Software Framework for Vehicle Routing and Logistics

Conference Proceeding
Enenkel, J., Geyer, J., Keiner, J., Nguyen, J., Steuler, J. L., & Urquhart, N. (in press)
A Unifying Software Framework for Vehicle Routing and Logistics. In Conference proceedings
A wide range of open source tools and real world data are available to support those working on vehicle routing and logistics optimisation. Despite such tools being available ...