A new scalable broadcast algorithm for multiport meshes with minimum communication steps
Ould-Khaoua, M., Al-Dubai, A., Al-Dubai, A., & Ould-Khaoua, M. (2003)
A new scalable broadcast algorithm for multiport meshes with minimum communication steps. Microprocessors and Microsystems, 27(3), 101-113. doi:10.1016/s0141-9331(02)00094-7
Many broadcast algorithms have been proposed for the mesh in the literature. However, most of these algorithms do not exhibit good scalability properties as the network size i...
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018)
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.090462
E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstanc...
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...
A Hybrid Meta-Heuristic for Multi-Objective Optimization: MOSATS
Baños, R., Gil, C., Paechter, B., & Ortega, J. (2007)
A Hybrid Meta-Heuristic for Multi-Objective Optimization: MOSATS. Journal of Mathematical Modelling and Algorithms, 6(2), 213-230. https://doi.org/10.1007/s10852-006-9041-6
Real optimization problems often involve not one, but multiple objectives, usually in conflict. In single-objective optimization there exists a global optimum, while in the mu...
Practices of community representatives in exploiting information channels for citizen democratic engagement
Hall, H., Cruickshank, P., & Ryan, B. (2019)
Practices of community representatives in exploiting information channels for citizen democratic engagement. Journal of Librarianship and Information Science, 51(4), 950-961. https://doi.org/10.1177/0961000618769966
The purpose of the research was to investigate the practices of elected, yet unpaid, community councillors in Scotland as they exploit information channels for democratic enga...
The public library as public sphere: a longitudinal analysis
Appleton, L., & Hall, H. (in press)
The public library as public sphere: a longitudinal analysis. Journal of Documentation, https://doi.org/10.1108/JD-02-2022-0031
The research was undertaken to explore the role of the UK public library as a public sphere, and the ways in which this role relates to the epistemic, community, and political...
Ransomware: Analysing the Impact on Windows Active Directory Domain Services
McDonald, G., Papadopoulos, P., Pitropakis, N., Ahmad, J., & Buchanan, W. J. (2022)
Ransomware: Analysing the Impact on Windows Active Directory Domain Services. Sensors, 22(3), Article 953. https://doi.org/10.3390/s22030953
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enter...
Still looking for new ways to play and learn… Expert perspectives and expectations for interactive toys
Hall, L., Paracha, S., Flint, T., MacFarlane, K., Stewart, F., Hagan-Green, G., & Watson, D. (2022)
Still looking for new ways to play and learn… Expert perspectives and expectations for interactive toys. International Journal of Child-Computer Interaction, 31, Article 100361. https://doi.org/10.1016/j.ijcci.2021.100361
The use of interactive, smart and connected toys is expected to increase rapidly with many claiming not only new ways to play, but also to have educational benefits. However, ...
Deriving ChaCha20 Key Streams From Targeted Memory Analysis
McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019)
Deriving ChaCha20 Key Streams From Targeted Memory Analysis. Journal of Information Security and Applications, 48, https://doi.org/10.1016/j.jisa.2019.102372
There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly r...
Exploiting the analogy between the immune system and sparse distributed memory.
Hart, E., & Ross, P. (2002)
Exploiting the analogy between the immune system and sparse distributed memory. Genetic Programming and Evolvable Machines, 4(4), 333-358. doi:10.1023/a:1026191011609
The relationship between immunological memory and a class of associative memories known as sparse distributed memories (SDM) is well known. This paper proposes a new model for...