Date


People

Output Type

Download Available

474 results

Comparative study on connected component labeling algorithms for embedded video processing systems.

Conference Proceeding
Walczyk, R., Armitage, A., & Binnie, D. (2010)
Comparative study on connected component labeling algorithms for embedded video processing systems. In H. Deligiannidis (Ed.), Proceedings of the IPCV'10
The objective of this paper is to carry out a detailed analysis of the most popular connected components labeling (CCL) algorithms for binary images. This study investigates t...

Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture.

Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012)
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture. In K. P. Chow, & L. Hui (Eds.), Information and Communications Security: 14th International Conference, ICICS 2012, Proceedings, 214-227. https://doi.org/10.1007/978-3-642-34129-8_19
Near Field Communication (NFC) has reinvigorated the multi-application smart card initiative. The NFC trials are relying on an extension of Issuer Centric Smart Card Model (IC...

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning

Conference Proceeding
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014)
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, (174-181). https://doi.org/10.1109/trustcom.2014.26
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...

Measuring perceived clutter in concept diagrams

Conference Proceeding
Hou, T., Chapman, P., & Oliver, I. (2016)
Measuring perceived clutter in concept diagrams. In 2016 IEEE Symposium on Visual Languages and Human-Centric Computinghttps://doi.org/10.1109/vlhcc.2016.7739661
Clutter in a diagram can be broadly defined as how visually complex the diagram is. It may be that different users perceive clutter in different ways, however. Moreover, it ha...

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection

Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018)
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560671
Cloud based storage is increasing in popularity, with large volumes of data being stored remotely. Digital forensics investigators examining such systems remotely are limited ...

Evolving robust policies for community energy system management

Conference Proceeding
Cardoso, R., Hart, E., & Pitt, J. (2019)
Evolving robust policies for community energy system management. In GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion. , (1120-1128). https://doi.org/10.1145/3321707.3321763
Community energy systems (CESs) are shared energy systems in which multiple communities generate and consume energy from renewable resources. At regular time intervals, each p...

Applying user testing data to UEM performance metrics.

Conference Proceeding
Chattratichart, J., & Brodie, J. (2004)
Applying user testing data to UEM performance metrics. In CHI EA '04 CHI '04 Extended Abstracts on Human Factors in Computing Systems, 1119-1122. doi:10.1145/985921.986003
The lack of standard assessment criteria for reliably comparing usability evaluation methods (UEMs) is an important gap in HCI knowledge. Recently, metrics for assessing thoro...

Hierarchical Home Agent Architecture for Mobile IP Communications

Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Hierarchical Home Agent Architecture for Mobile IP Communications. In 11th IEEE Symposium on Computers and Communications, 2006. ISCC '06. Proceedings, 136-141. doi:10.1109/iscc.2006.84
While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile nod...

An immune system approach to scheduling in changing environments.

Conference Proceeding
Hart, E., & Ross, P. (1998)
An immune system approach to scheduling in changing environments. In W. Banzhaf, J. M. Daida, A. E. Eiben, M. H. Garzon, V. Honavar, M. Jakiela, & R. E. Smith (Eds.), GECCO-99 : proceedings of the genetic and evolutionary computation conference. Volume 2, 1559-1566
This paper describes the application of an artificial immune system, (AIS), model to a scheduling application, in which sudden changes in the scheduling environment require th...

Increasing Trust in Meta-Heuristics by Using MAP-Elites

Conference Proceeding
Urquhart, N., Guckert, M., & Powers, S. (2019)
Increasing Trust in Meta-Heuristics by Using MAP-Elites. In GECCO '19 Companion, (1345-1348). https://doi.org/10.1145/3319619.3326816
Intelligent AI systems using approaches containing emergent elements often encounter acceptance problems. Results do not get sufficiently explained and the procedure itself ca...