A new chaos-based secure image encryption scheme using multiple substitution boxes
Conference Proceeding
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015)
A new chaos-based secure image encryption scheme using multiple substitution boxes. In 2015 Conference on Information Assurance and Cyber Security (CIACS)https://doi.org/10.1109/ciacs.2015.7395561
Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern comm...
A model checking based approach to automatic test suite generation for testing web services and BPEL.
Conference Proceeding
Zhao, H., Sun, J., & Liu, X. (2012)
A model checking based approach to automatic test suite generation for testing web services and BPEL. In Proceedings of IEEE Asia-Pacific Services Computing Conference, 61-69. https://doi.org/10.1109/APSCC.2012.29
With the rapid increase of Web Service applications, the reliability of web service and service composition has drawn particular attention from researchers and industries. Man...
Converting an existing taxonomic data resource to employ an ontology and LSIDs.
Conference Proceeding
Kennedy, J., Gales, R., & Kukla, R. (2006)
Converting an existing taxonomic data resource to employ an ontology and LSIDs. In L. Belbin, A. Rissoné, & A. Weitzman (Eds.), Proceedings of TDWG (2006), St Louis, MI
Data sharing is fundamental to biodiversity and taxonomic data applications, however previous attempts at developing mechanisms to facilitate sharing within the community have...
Visual-spatial-motor integration in a cross-section of primary-aged children: implications for assessing risk of Dyslexia
Conference Proceeding
Piotrowska, B., Willis, A., MacLean, R., Murray, J., & Kerridge, J. (2015)
Visual-spatial-motor integration in a cross-section of primary-aged children: implications for assessing risk of Dyslexia. In Proceedings European Conference on Visual Perception ECVP 2015
Dyslexia is a common condition characterized by difficulties with reading and writing despite adequate intelligence, education and motivation. Many individuals with dyslexia a...
A refinement calculus for the development of real-time systems.
Conference Proceeding
Chen, Z., Cau, A., Zedan, H., Liu, X., & Yang, H. (1998)
A refinement calculus for the development of real-time systems. In 5th Asia Pacific Software Engineering Conference, APSEC '98, 61. https://doi.org/10.1109/APSEC.1998.733588
We present a calculus which can transfer specifications
to objects for the development of real-time systems. The
object model is based on a practical OO development
technique—...
The Design and Evaluation of a Modern C++ Library
Conference Proceeding
Chalmers, K. (2016)
The Design and Evaluation of a Modern C++ Library. In Communicating Process Architectures 2016
Although many CSP inspired libraries exist, none yet have targeted modern C++ (C++11 onwards). The work presented has a main objective of providing a new C++ CSP library which...
Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space
Conference Proceeding
Singh Jamnal, G., Liu, X., & Fan, L. (2017)
Home automation: HMM based fuzzy rule engine for Ambient intelligent smart space. In Proceedings of The 29th International Conference on Software Engineering and Knowledge Engineering
In this paper, we proposed a new type of decision making system to achieve the intelligent goal for automated smart environments. The artificial intelligence techniques, used ...
The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser
Conference Proceeding
Tsiros, A., & Leplâtre, G. (2017)
The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser. In J. Pätynen, V. Välimäki, & T. Lokki (Eds.), Proceedings of the 14th Sound and Music Computing Conference 2017. , (320-327
This paper presents the results of an investigation into audio visual (AV) correspondences conducted as part of the development of Morpheme, a painting interface to control a ...
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.
Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...
Real-world applications of evolutionary computing
Conference Proceeding
Cagnoni, S., Poli, R., Smith, G. D., Corne, D., Oates, M., Hart, E., …Fogarty, T. C. (2000)
Real-world applications of evolutionary computing. In Proceedings of EvoWorkshops 2000
This book constitutes the refereed proceedings of six workshops on evolutionary computation held concurrently as EvoWorkshops 2000 in Edinburgh, Scotland, UK, in April 2000.
T...