Date


People

Output Type

Download Available

Library Of Congress

Dewey Decimal

832 results

Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events

Conference Proceeding
Bishop, C., Esteves, A., & McGregor, I. (2017)
Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events. In ICMI 2017 Proceedings of the 19th ACM International Conference on Multimodal Interactionhttps://doi.org/10.1145/3136755.3136781
This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-...

Mobile IP conditional binding update.

Conference Proceeding
Romdhani, I., & Al-Dubai, A. (2007)
Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management, 64-70
Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding associat...

A Task Orientated Requirements Ontology for Cloud Computing Services

Conference Proceeding
Greenwell, R., Liu, X., Chalmers, K., & Pahl, C. (2016)
A Task Orientated Requirements Ontology for Cloud Computing Services. In Proceedings of the 6th International Conference on Cloud Computing and Services Science (CLOSER 2016), (121-128). https://doi.org/10.5220/0005752301210128
Requirements ontology offers a mechanism to map requirements for cloud computing services to cloud computing resources. Multiple stakeholders can capture and map knowledge in ...

Sub-file Hashing Strategies for Fast Contraband Detection

Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018)
Sub-file Hashing Strategies for Fast Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560680
Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for man...

Props Alive: A Framework for Augmented Reality Stop Motion Animation

Conference Proceeding
Casas, L., Kosek, M., & Mitchell, K. (2020)
Props Alive: A Framework for Augmented Reality Stop Motion Animation. In 2017 IEEE 10th Workshop on Software Engineering and Architectures for Realtime Interactive Systems (SEARIS)https://doi.org/10.1109/SEARIS41720.2017.9183487
Stop motion animation evolved in the early days of cinema with the aim to create an illusion of movement with static puppets posed manually each frame. Current stop motion mov...

AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks

Conference Proceeding
Rotärmel, S., Farrenkopf, T., Guckert, M., & Urquhart, N. (2017)
AGADE-TRAFFIC: Multi-Agent Simulations in Geographical Networks. In Y. Demazeau, P. Davidsson, J. Bajo, & Z. Vale (Eds.), Advances in Practical Applications of Cyber-Physical Multi-Agent Systems: The PAAMS Collection. , (355-358). https://doi.org/10.1007/978-3-319-59930-4_37
AGADE-TRAFFIC is a tool for simulating traffic flow in networks. Traffic participants are modelled as NetLogo agents and are visualised in a graphical user interface. Geograph...

Using social networking tools to promote eParticipation initiatives.

Conference Proceeding
Taylor-Smith, E., & Lindner, R. (2009)
Using social networking tools to promote eParticipation initiatives. In A. Prosser, & P. Parycek (Eds.), Proceedings of EDEM 2009 - Conference on Electronic Democracy, September 7-8, 2009, Vienna. , (115-121
This paper describes the context and background of the conference workshop “Social networking tools and widgets to promote or expand eParticipation initiatives”. Social networ...

BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN

Conference Proceeding
Boukria, S., Guerroumi, M., & Romdhani, I. (2020)
BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780
Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global networ...

An intelligent agent security intrusion system

Conference Proceeding
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2002)
An intelligent agent security intrusion system. In Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems. , (94-99). https://doi.org/10.1109/ecbs.2002.999827
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly secu...

Commonsense-enhanced Natural Language Generation for Human-Robot Interaction

Conference Proceeding
Gkatzia, D. (in press)
Commonsense-enhanced Natural Language Generation for Human-Robot Interaction
Commonsense is vital for human communication, as it allows us to make inferences without explicitly mentioning the context. Equipping robots with commonsense knowledge would l...