Date


People

Output Type

Download Available

357 results

PhotoPal: companionship, sharing and the digital echo.

Conference Proceeding
Mival, O., O'Keefe, B., Bradley, J., Roa-Seiler, N., & Benyon, D. (2008)
PhotoPal: companionship, sharing and the digital echo. In Proceedings of CHI Collocated Social Practices Surrounding Photos Workshop
This short paper introduces the research of the 14 partner, EU Framework 6 project, COMPANIONS. It focuses on the development of PhotoPal, a multimodal system harnessing the c...

Ontology-Driven Automated Generation of Data Entry Interfaces to Databases

Conference Proceeding
Cannon, A., Kennedy, J. B., Paterson, T., & Watson, M. F. (2004)
Ontology-Driven Automated Generation of Data Entry Interfaces to Databases. In H. Williams, & L. Mackinnon (Eds.), Key Technologies for Data Management; Lecture Notes in Computer Science, 150-164. doi:10.1007/978-3-540-27811-5_15
This paper discusses an ontology based approach for the automatic generation of data entry interfaces to databases. An existing domain ontology is mapped to a system domain mo...

Security and Routing Scoped IP Multicast Addresses

Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09. , (228-235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...

Workshop on Interactivity in Healthcare Systems (IHS).

Conference Proceeding
Hanson, V. L., Webster, G., & Dennis, M. (2015)
Workshop on Interactivity in Healthcare Systems (IHS). In Human-Computer Interaction–INTERACT 2015, 677-678. https://doi.org/10.1007/978-3-319-22723-8_98
We are all living longer with average life expectancy increasing across the globe [1]. However, chronic conditions such as heart disease, strokes and cancer, coupled with an i...

An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs

Conference Proceeding
Liu, X., & Liu, Q. (2017)
An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. In X. Sun, H. C. Chao, X. You, & E. Bertino (Eds.), Cloud Computing and Security (ICCCS 2017), (450-459). https://doi.org/10.1007/978-3-319-68505-2_39
With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. Ho...

DEEPC: Dynamic Energy Profiling of Components

Conference Proceeding
Liu, X., Chinenyeze, S. J., & Al-Dubai, A. (2016)
DEEPC: Dynamic Energy Profiling of Components. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/COMPSAC.2016.90
Many software projects are built using reusable components (i.e. reusable objects - as per component and connectors in software architectures). During component selection in C...

Mobile Multicast Route Optimisation

Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Mobile Multicast Route Optimisation. In IEEE International Conference on Communications, 2006. ICC '06, 1977-1983. doi:10.1109/icc.2006.255060
The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional ...

Comparative analysis of chaotic and non-chaotic image encryption schemes

Conference Proceeding
Younas, M. B., & Ahmad, J. (2014)
Comparative analysis of chaotic and non-chaotic image encryption schemes. In 2014 International Conference on Emerging Technologies (ICET)https://doi.org/10.1109/icet.2014.7021021
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Secu...

DNA Sequence Based Medical Image Encryption Scheme

Conference Proceeding
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018)
DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2018.8674221
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdropper...

Secure speech communication algorithm via DCT and TD-ERCS chaotic map

Conference Proceeding
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017)
Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)https://doi.org/10.1109/iceee2.2017.7935827
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have ...