Research explorer tool

Date


Output Type

Download Available

68 results

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors

Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, (89-98). https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...

Ethical assessment in e-Health

Conference Proceeding
Gonzalez-Pinto, A., Ruiz de Azua, S., Mival, O. H., Thuernmler, C., Jumelle, A. K. L., Ispas, I., …González-Pinto, A. (2015)
Ethical assessment in e-Health. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 262-268. https://doi.org/10.1109/healthcom.2014.7001852
While innovative e-Health and m-Health technologies and solutions will eventually change the way health and social care are delivered, it raises many challenges regarding what...

A product line based aspect-oriented generative unit testing approach to building quality components

Conference Proceeding
Feng, Y., Liu, X., & Kerridge, J. (2007)
A product line based aspect-oriented generative unit testing approach to building quality components. In 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), 403-408. doi:10.1109/compsac.2007.35
The quality of component-based systems highly depends on how effectively testing is carried out. To achieve the maximal testing effectiveness, this paper presents a product li...

A conceptual language for querying object oriented data

Conference Proceeding
Barclay, P. J., & Kennedy, J. (1994)
A conceptual language for querying object oriented data. In D. S. Bowers (Ed.), Directions in Databases: Proceedings [of the] 12th British National Conference on Databases, BNCOD 12, Guildford, United Kingdom, July 6-8, 1994 (187-204). https://doi.org/10.1007/3-540-58235-5_43
A variety of languages have been proposed for object oriented database systems in order to provide facilities for ad hoc querying. However, in order to model at the conceptual...

On the design of scalable pipelined broadcasting for mesh networks

Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
On the design of scalable pipelined broadcasting for mesh networks. In High Performance Computing Systems and Applications, 98-105. https://doi.org/10.1109/HPCSA.2002.1019140
Minimising the communication latency and achieving considerable scalability are of paramount importance when designing high performance broadcast algorithms. Many algorithms f...

A Simulation of Interactions Between the Critically Endangered North Atlantic Right Whale Eubalaena glacialis and Shipping using Dynamically Variable Temporal Granularity to Minimise Run Time

Conference Proceeding
Clyne, H., & Kennedy, J. (2001)
A Simulation of Interactions Between the Critically Endangered North Atlantic Right Whale Eubalaena glacialis and Shipping using Dynamically Variable Temporal Granularity to Minimise Run Time. In F. Ghassemi, D. White, D. Cuddy, & T. Nakanishi (Eds.), MODSIM 2001 : International Congress on Modelling and Simulation, the Australian National University, Canberra, Australia, 10-13 December 2001 : integrating models for natural resources management across disciplines, issues and scales : proceedings, 813-818
Collisions with ships are a major cause of mortality (~35%) for the severely endangered North Atlantic right whale Eubalaena glacialis, currently numbering only around 370 ind...

Investigating false positive reduction in HTTP via procedure analysis.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

A local search for the timetabling problem.

Conference Proceeding
Rossi-Doria, O., Blum, C., Knowles, J., Sampels, M., Socha, K., & Paechter, B. (2001)
A local search for the timetabling problem. In E. Burke, & P. Causmaecker (Eds.), Proceedings of the Conference on the Practice and Theory of Automated Timetabling (PATAT 2002), 124-127
This work is part of the Metaheuristic Network, a European Commission project that seeks to empirically compare the performance of various metaheuristics on different combinat...

A comparison of set-based and graph-based visualisations of overlapping classification hierarchies.

Conference Proceeding
Graham, M., Kennedy, J., & Hand, C. (2000)
A comparison of set-based and graph-based visualisations of overlapping classification hierarchies. In V. Gesu, S. Levialdi, & L. Tarantino (Eds.), 5th Working Conference on Advanced Visual Interfaces (AVI 2000), 41-50. https://doi.org/10.1145/345513.345243
The visualisation of hierarchical information sets has been a staple of Information Visualisation since the field came into being in the early 1990's. However, at present, sup...